Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-34326 | 1 Realtek | 2 Rtl8195am, Rtl8195am Firmware | 2022-10-14 | N/A | 7.5 HIGH |
In ambiot amb1_sdk (aka SDK for Ameba1) before 2022-06-20 on Realtek RTL8195AM devices before 284241d70308ff2519e40afd7b284ba892c730a3, the timer task and RX task would be locked when there are frequent and continuous Wi-Fi connection (with four-way handshake) failures in Soft AP mode. | |||||
CVE-2021-39306 | 1 Realtek | 2 Rtl8195am, Rtl8195am Firmware | 2022-01-04 | 7.5 HIGH | 9.8 CRITICAL |
A stack buffer overflow was discovered on Realtek RTL8195AM device before 2.0.10, it exists in the client code when an attacker sends a big size Authentication challenge text in WEP security. | |||||
CVE-2021-43573 | 1 Realtek | 2 Rtl8195am, Rtl8195am Firmware | 2021-12-21 | 7.5 HIGH | 9.8 CRITICAL |
A buffer overflow was discovered on Realtek RTL8195AM devices before 2.0.10. It exists in the client code when processing a malformed IE length of HT capability information in the Beacon and Association response frame. | |||||
CVE-2020-9395 | 1 Realtek | 8 Rtl8195am, Rtl8195am Firmware, Rtl8710af and 5 more | 2021-07-21 | 4.9 MEDIUM | 8.0 HIGH |
An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer. |