A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
References
Link | Resource |
---|---|
https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day | Exploit Third Party Advisory |
Configurations
History
14 Jun 2021, 18:07
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:realtek:rtl8195a_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:realtek:rtl8710c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:realtek:rtl8710c:-:*:*:*:*:*:*:* cpe:2.3:h:realtek:rtl8195a:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.7
v3 : 8.0 |
CWE | CWE-787 |
04 Jun 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-04 13:15
Updated : 2024-02-04 21:47
NVD link : CVE-2020-27301
Mitre link : CVE-2020-27301
CVE.ORG link : CVE-2020-27301
JSON object : View
Products Affected
realtek
- rtl8710c
- rtl8710c_firmware
- rtl8195a
- rtl8195a_firmware
CWE
CWE-787
Out-of-bounds Write