Количество 3
Количество 3
CVE-2020-27302
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
GHSA-x8rx-53qq-29mq
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
BDU:2021-03329
Уязвимость функции memcpy сетевых адаптеров Realtek, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-27302 A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake. | CVSS3: 8 | 0% Низкий | больше 4 лет назад | |
GHSA-x8rx-53qq-29mq A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake. | 0% Низкий | больше 3 лет назад | ||
BDU:2021-03329 Уязвимость функции memcpy сетевых адаптеров Realtek, позволяющая нарушителю выполнить произвольный код | CVSS3: 8 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу