Page 7 of 70 results (0.012 seconds)

CVSS: 8.0EPSS: 0%CPEs: 8EXPL: 0

06 Jul 2020 — An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer. Se detectó un problema en los dispositivos Realtek RTL8195AM, RTL8711AM, RTL8711AF y RTL8710AF versiones anteriores a 2.0.6. Se presenta un desbordamiento del búfer en la región stack de la memoria en el código del cliente que se encarga del protoco... • https://github.com/ambiot/amb1_arduino/commit/dcea55cf9775a0166805b3db845b237ecd5e74ea#diff-d06e7a87f34cc464a56799a419033014 • CWE-787: Out-of-bounds Write •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

08 Jun 2020 — A security misconfiguration vulnerability exists in the SDK of some Realtek ADSL/PON Modem SoC firmware, which allows attackers using a default password to execute arbitrary commands remotely via the build-in network monitoring tool. Se presenta una vulnerabilidad de configuración incorrecta de seguridad en el SDK de algunos firmware de Realtek ADSL/PON Modem SoC, que permite a atacantes que usan una contraseña predeterminada ejecutar comandos arbitrarios remotamente por medio de la herramienta de monitoreo... • https://www.twcert.org.tw/tw/cp-132-3681-2a3f6-1.html •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Feb 2020 — Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0. El controlador rt640x64.sys de Realtek NDIS, versión de archivo 10.1.505.2015, no lleva a cabo ninguna comprobación de tamaño en un búfer de entrada desde el espacio del usuario, que el controlador asume que tiene un tamaño mayor q... • https://downwithup.github.io/CVEPosts.html • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 2%CPEs: 36EXPL: 4

24 Jan 2020 — A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 201... • https://packetstorm.news/files/id/156083 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.5EPSS: 1%CPEs: 36EXPL: 4

24 Jan 2020 — A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP thro... • https://packetstorm.news/files/id/156083 • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 0

13 Nov 2017 — A local privilege escalation vulnerability was identified in the Realtek audio driver versions prior to 6.0.1.8224 in some Lenovo ThinkPad products. An attacker with local privileges could execute code with administrative privileges. Se ha identificado una vulnerabilidad de escalado de privilegios en las versiones anteriores a la 6.0.1.8224 del controlador de audio Realtek en productos Lenovo ThinkPad. Un atacante con privilegios locales podría ejecutar código con privilegios administrativos. • https://support.lenovo.com/us/en/product_security/LEN-15759 •

CVSS: 10.0EPSS: 94%CPEs: 62EXPL: 2

24 Apr 2015 — The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. El servicio miniigd SOAP en Realtek SDK permite a atacantes remotos ejecutar código arbitrario a través de una solicitud NewInternalClient manipulada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Realtek SDK. Authentication is not required to exploit this vulnerability. The specific... • https://packetstorm.news/files/id/132090 •

CVSS: 9.3EPSS: 78%CPEs: 1EXPL: 4

18 Dec 2008 — Stack-based buffer overflow in Realtek Media Player (aka Realtek Sound Manager, RtlRack, or rtlrack.exe) 1.15.0.0 allows remote attackers to execute arbitrary code via a crafted playlist (PLA) file. Desbordamiento de búfer basado en pila en Realtek Media Player (anteriormente conocido como Realtek Sound Manager, RtlRack, o rtlrack.exe) v1.15.0.0 permite a atacantes remotos ejecutar código a su elección a través de un fichero de lista de reproducción manipulado. • https://www.exploit-db.com/exploits/7492 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 1

24 Apr 2008 — Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allow local users to create, write, and read registry keys via a crafted IOCTL request. Los Drivers para los Codec de Audio de Realtek HD, RTKVHDA.sys y RTKVHDA64.sys, versiones anteriores a 6.0.1.5605 en Windows Vista, permite a usuarios locales crear, escribir y registrar claves a través de una petición IOCTL manipulada. • http://secunia.com/advisories/29953 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

24 Apr 2008 — Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request. Desbordamiento de entero en los controladores RTKVHDA.sys y RTKVHDA64.sys del Codec de audio Realtek HD anterior a la version 6.0.1.5605 en Windows Vista permite a usuarios locales ejecutar código arbitrario mediante la creación de respuestas IOCTL manipuladas. • http://secunia.com/advisories/29953 • CWE-189: Numeric Errors •