Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
realtek vulnerabilities and exploits
(subscribe to this query)
295
VMScore
CVE-2022-21742
Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services.
Realtek Rtl8156 Firmware
Realtek Rtl8156b Firmware
Realtek Rtl8153 Firmware
Realtek Rtl8153b Firmware
Realtek Rtl8154 Firmware
Realtek Rtl8154b Firmware
Realtek Rtl8152b Firmware
436
VMScore
CVE-2020-9395
An issue exists on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices prior to 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.
Realtek Rtl8711af Firmware
Realtek Rtl8711am Firmware
Realtek Rtl8195am Firmware
Realtek Rtl8710af Firmware
427
VMScore
CVE-2019-18990
A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network....
Realtek Rtl8812ar Firmware 1.21ww
Realtek Rtl8196d Firmware 1.0.0
Realtek Rtl8192er Firmware 2.10
Realtek Rtl8881an Firmware 1.09
NA
CVE-2022-32967
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
Realtek Rtl8111ep-cg Firmware 5.0.10
Realtek Rtl8111ep-cg Firmware
Realtek Rtl8111fp-cg Firmware 5.0.10
Realtek Rtl8111fp-cg Firmware
NA
CVE-2022-40740
Realtek GPON router has insufficient filtering for special characters. A remote attacker authenticated as an administrator can exploit this vulnerability to perform command injection attacks, to execute arbitrary system command, manipulate system or disrupt service.
Realtek Xpon Software Development Kit 3.3
Realtek Xpon Software Development Kit 4.0
Realtek Xpon Software Development Kit 4.1
Realtek Xpon Software Development Kit 1.9
Realtek Usdk 1.0
Realtek Usdk 2.2
Realtek Usdk 2.0
890
VMScore
CVE-2021-35393
Realtek Jungle SDK version v2.x up to v3.4.14B provides a 'WiFi Simple Config' server that implements both UPnP and SSDP protocols. The binary is usually named wscd or mini_upnpd and is the successor to miniigd. The server is vulnerable to a stack buffer overflow vulner...
Realtek Realtek Jungle Sdk
1 Github repository
685
VMScore
CVE-2020-27302
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
Realtek Rtl8710c Firmware -
Realtek Rtl8195a Firmware -
891
VMScore
CVE-2021-35395
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both o...
Realtek Realtek Jungle Sdk
1 Article
685
VMScore
CVE-2020-27301
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
Realtek Rtl8710c Firmware -
Realtek Rtl8195a Firmware -
890
VMScore
CVE-2021-35394
Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability t...
Realtek Realtek Jungle Sdk
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »