CVE-2025-71297
Kernel Warning in Linux rtw8822b WiFi Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realtek | rtw88 | 8822b |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's wifi driver for the Realtek rtw88 8822b chip. The function rtw8822b_set_antenna() can be called from userspace even when the wifi chip is powered off. When this happens, the function rtw8822b_config_trx_mode() tries to read RF registers, but since the chip is off, it returns unexpected values, triggering a WARNING in the kernel.
The fix involves modifying rtw8822b_set_antenna() to call rtw8822b_config_trx_mode() only when the chip is powered on, preventing the warning and improper register reads.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and instability when userspace attempts to set the antenna configuration while the wifi chip is powered off. Although it does not describe a direct security exploit such as privilege escalation or data leakage, the warnings could lead to system instability or crashes, potentially affecting system reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for specific WARNING messages related to the rtw8822b driver. In particular, look for warnings triggered by rtw8822b_config_trx_mode() when the chip is powered off.
- Check the kernel log for the warning message: "write RF mode table fail" and related stack trace involving rtw8822b_config_trx_mode and rtw8822b_set_antenna.
- Use the command: dmesg | grep rtw8822b to filter kernel messages related to the vulnerable driver.
- Alternatively, monitor system logs with: journalctl -k | grep rtw8822b
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the Linux kernel version in use includes the fix that prevents rtw8822b_set_antenna() from calling rtw8822b_config_trx_mode() when the chip is powered off.
If an immediate kernel upgrade is not possible, avoid calling userspace commands or operations that trigger antenna configuration on the rtw8822b device when it is powered off.
Monitor system logs for the warning messages and avoid actions that cause these warnings until the system is patched.