First published: Fri Jun 04 2021(Updated: )
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
Credit: vuln@vdoo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Rtl8710c Firmware | ||
Realtek Rtl8710c | ||
Realtek Rtl8195a Firmware | ||
Realtek RTL8195A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-27301.
CVE-2020-27301 has a severity level of high (8).
Realtek RTL8710c Firmware and Realtek RTL8195A Firmware are affected by CVE-2020-27301.
CVE-2020-27301 can lead to remote code execution on affected devices.
CVE-2020-27301 can be exploited by an attacker in Wi-Fi range sending a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.