Логотип exploitDog
bind:CVE-2020-9395
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-9395

Количество 2

Количество 2

nvd логотип

CVE-2020-9395

больше 5 лет назад

An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-m35f-qmp6-pvj2

больше 3 лет назад

An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-9395

An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.

CVSS3: 8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-m35f-qmp6-pvj2

An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу