Vulnerabilities (CVE)

Filtered by vendor Realtek Subscribe
Filtered by product Rtl8195am Firmware
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34326 1 Realtek 2 Rtl8195am, Rtl8195am Firmware 2024-11-21 N/A 7.5 HIGH
In ambiot amb1_sdk (aka SDK for Ameba1) before 2022-06-20 on Realtek RTL8195AM devices before 284241d70308ff2519e40afd7b284ba892c730a3, the timer task and RX task would be locked when there are frequent and continuous Wi-Fi connection (with four-way handshake) failures in Soft AP mode.
CVE-2021-43573 1 Realtek 2 Rtl8195am, Rtl8195am Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow was discovered on Realtek RTL8195AM devices before 2.0.10. It exists in the client code when processing a malformed IE length of HT capability information in the Beacon and Association response frame.
CVE-2021-39306 1 Realtek 2 Rtl8195am, Rtl8195am Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
A stack buffer overflow was discovered on Realtek RTL8195AM device before 2.0.10, it exists in the client code when an attacker sends a big size Authentication challenge text in WEP security.
CVE-2020-9395 1 Realtek 8 Rtl8195am, Rtl8195am Firmware, Rtl8710af and 5 more 2024-11-21 4.9 MEDIUM 8.0 HIGH
An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.