Skip to main content

CVE-2025-8301: CWE-122: Heap-based Buffer Overflow in Realtek RTL8811AU

High
VulnerabilityCVE-2025-8301cvecve-2025-8301cwe-122
Published: Tue Sep 02 2025 (09/02/2025, 20:02:25 UTC)
Source: CVE Database V5
Vendor/Project: Realtek
Product: RTL8811AU

Description

Realtek RTL8811AU rtwlanu.sys N6CSet_DOT11_CIPHER_DEFAULT_KEY Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Realtek RTL8811AU drivers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the N6CSet_DOT11_CIPHER_DEFAULT_KEY function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-24786.

AI-Powered Analysis

AILast updated: 09/02/2025, 20:33:32 UTC

Technical Analysis

CVE-2025-8301 is a high-severity heap-based buffer overflow vulnerability found in the Realtek RTL8811AU wireless network adapter driver, specifically in the function N6CSet_DOT11_CIPHER_DEFAULT_KEY within the rtwlanu.sys driver component. This vulnerability arises due to improper validation of the length of user-supplied data before copying it into a fixed-length heap buffer, leading to a heap-based buffer overflow condition. Exploitation of this flaw allows a local attacker, who already has the ability to execute low-privileged code on the target system, to escalate their privileges to SYSTEM level. This means the attacker can execute arbitrary code with the highest privileges, potentially taking full control of the affected system. The vulnerability is present in version 1030.38.712.2019 of the Realtek RTL8811AU driver. The CVSS v3.0 base score is 7.8, reflecting high severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability was reserved in late July 2025 and published in early September 2025. The weakness is classified under CWE-122, which corresponds to heap-based buffer overflow vulnerabilities that can lead to memory corruption and arbitrary code execution.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using devices with the affected Realtek RTL8811AU wireless adapters. Since exploitation requires local code execution at a low privilege level, the initial compromise vector could be through malware, phishing, or other means that allow execution of unprivileged code. Once exploited, attackers can escalate privileges to SYSTEM, enabling them to disable security controls, install persistent malware, exfiltrate sensitive data, or disrupt operations. This is particularly concerning for critical infrastructure, government agencies, financial institutions, and enterprises relying on wireless connectivity with these drivers. The high impact on confidentiality, integrity, and availability means that data breaches, system takeovers, and service disruptions are plausible outcomes. The lack of known public exploits currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly after disclosure. The absence of patches increases exposure duration. Organizations with remote or hybrid workforces using laptops or devices with this driver are at increased risk, as local access could be gained through physical access or remote code execution vulnerabilities chained with this privilege escalation.

Mitigation Recommendations

1. Immediate inventory and identification of devices using the Realtek RTL8811AU driver version 1030.38.712.2019 within the organization. 2. Apply vendor-supplied patches or driver updates as soon as they become available; monitor Realtek and security advisories closely. 3. Restrict local code execution capabilities by enforcing application whitelisting and least privilege principles to reduce the chance of initial low-privileged code execution. 4. Employ endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of privilege escalation attempts. 5. Harden wireless device configurations and limit physical access to devices to reduce local attack vectors. 6. Implement network segmentation to isolate critical systems and limit lateral movement in case of compromise. 7. Conduct user awareness training to prevent phishing or malware infections that could lead to initial low-privileged code execution. 8. Regularly audit and update device drivers to ensure they are current and free from known vulnerabilities. 9. Consider disabling or replacing affected wireless adapters in high-security environments until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-07-28T23:19:56.156Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b750ecad5a09ad00e85e49

Added to database: 9/2/2025, 8:17:48 PM

Last enriched: 9/2/2025, 8:33:32 PM

Last updated: 9/3/2025, 12:34:09 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats