An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.
2020-07-06T22:15:11.553
2024-11-21T05:40:33.507
Modified
CVSSv3.1: 8.0 (HIGH)
AV:A/AC:M/Au:S/C:P/I:P/A:P
4.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | realtek | rtl8711af_firmware | < 2.0.6 | Yes |
Hardware | realtek | rtl8711af | - | No |
Operating System | realtek | rtl8711am_firmware | < 2.0.6 | Yes |
Hardware | realtek | rtl8711am | - | No |
Operating System | realtek | rtl8195am_firmware | < 2.0.6 | Yes |
Hardware | realtek | rtl8195am | - | No |
Operating System | realtek | rtl8710af_firmware | < 2.0.6 | Yes |
Hardware | realtek | rtl8710af | - | No |