First published: Fri Jun 04 2021(Updated: )
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
Credit: vuln@vdoo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Rtl8710c Firmware | ||
Realtek Rtl8710c | ||
Realtek Rtl8195a Firmware | ||
Realtek RTL8195A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27302 is a stack buffer overflow vulnerability in Realtek RTL8710 (and other Ameba-based devices) that can lead to remote code execution.
CVE-2020-27302 occurs when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake, which triggers a stack buffer overflow in the "memcpy" function.
The Realtek RTL8710c Firmware and the Realtek RTL8195A Firmware are affected by CVE-2020-27302.
CVE-2020-27302 has a severity rating of high.
You can find more information about CVE-2020-27302 at the following link: [https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day](https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day).