CVE-2025-8301
BaseFortify
Publication date: 2025-09-02
Last updated on: 2025-09-10
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realtek | wi-fi_usb_driver | to 1030.52.0325.2025 (exc) |
| realtek | rtl8811au | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-8301 is a local privilege escalation vulnerability in the Realtek RTL8811AU wireless driver. It occurs due to a heap-based buffer overflow in the function N6CSet_DOT11_CIPHER_DEFAULT_KEY caused by improper validation of the length of user-supplied data before copying it into a fixed-length heap buffer. An attacker who already has low-privileged code execution on the system can exploit this flaw to escalate their privileges and execute arbitrary code with SYSTEM-level privileges. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker who has limited access to a system to escalate their privileges to SYSTEM level, effectively gaining full control over the affected system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of malicious software, and disruption of system availability. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the Realtek RTL8811AU driver is updated to a version where this heap-based buffer overflow flaw in the N6CSet_DOT11_CIPHER_DEFAULT_KEY function is fixed. Limit the ability of low-privileged users to execute code on the system, as exploitation requires local code execution. Applying vendor patches or updates as soon as they become available is recommended. [1]