Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rtl8195am_firmware
(Realtek)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-09-27 | CVE-2022-34326 | In ambiot amb1_sdk (aka SDK for Ameba1) before 2022-06-20 on Realtek RTL8195AM devices before 284241d70308ff2519e40afd7b284ba892c730a3, the timer task and RX task would be locked when there are frequent and continuous Wi-Fi connection (with four-way handshake) failures in Soft AP mode. | Rtl8195am_firmware | 7.5 | ||
2021-12-22 | CVE-2021-39306 | A stack buffer overflow was discovered on Realtek RTL8195AM device before 2.0.10, it exists in the client code when an attacker sends a big size Authentication challenge text in WEP security. | Rtl8195am_firmware | 9.8 | ||
2021-11-11 | CVE-2021-43573 | A buffer overflow was discovered on Realtek RTL8195AM devices before 2.0.10. It exists in the client code when processing a malformed IE length of HT capability information in the Beacon and Association response frame. | Rtl8195am_firmware | 9.8 | ||
2020-07-06 | CVE-2020-9395 | An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer. | Rtl8195am_firmware, Rtl8710af_firmware, Rtl8711af_firmware, Rtl8711am_firmware | 8.0 |