Realtek rtl81xx SDK Wi-Fi Driver MgntActSet_TEREDO_SET_RS_PACKET Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Realtek rtl81xx SDK Wi-Fi driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the MgntActSet_TEREDO_SET_RS_PACKET function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25857.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-882/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Sep 2025, 14:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-882/ - Third Party Advisory | |
CPE | cpe:2.3:a:realtek:wi-fi_usb_driver:*:*:*:*:*:windows:*:* cpe:2.3:h:realtek:rtl8811au:-:*:*:*:*:*:*:* |
|
First Time |
Realtek
Realtek wi-fi Usb Driver Realtek rtl8811au |
02 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-02 20:15
Updated : 2025-09-10 14:59
NVD link : CVE-2025-8299
Mitre link : CVE-2025-8299
CVE.ORG link : CVE-2025-8299
JSON object : View
Products Affected
realtek
- rtl8811au
- wi-fi_usb_driver
CWE
CWE-122
Heap-based Buffer Overflow