A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
References
Link | Resource |
---|---|
https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day | Exploit Third Party Advisory |
https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day - Exploit, Third Party Advisory |
Information
Published : 2021-06-04 13:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27302
Mitre link : CVE-2020-27302
CVE.ORG link : CVE-2020-27302
JSON object : View
Products Affected
realtek
- rtl8710c
- rtl8710c_firmware
- rtl8195a_firmware
- rtl8195a
CWE
CWE-787
Out-of-bounds Write