Vulnerability Description
Realtek rtl81xx SDK Wi-Fi Driver rtwlanu Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Realtek rtl81xx SDK Wi-Fi driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the N6CSet_DOT11_CIPHER_DEFAULT_KEY function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26552.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtek | Wi-Fi Usb Driver | < 1030.52.0325.2025 |
| Realtek | Rtl8811Au | - |
Related Weaknesses (CWE)
References
- https://www.zerodayinitiative.com/advisories/ZDI-25-883/Third Party Advisory
FAQ
What is CVE-2025-8300?
CVE-2025-8300 is a vulnerability with a CVSS score of 8.8 (HIGH). Realtek rtl81xx SDK Wi-Fi Driver rtwlanu Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations...
How severe is CVE-2025-8300?
CVE-2025-8300 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8300?
Check the references section above for vendor advisories and patch information. Affected products include: Realtek Wi-Fi Usb Driver, Realtek Rtl8811Au.