Heap-Based Buffer Overflow Vulnerability in Realtek RTL81XX SDK Wi-Fi Driver
CVE-2025-8300

8.8HIGH

Key Information:

Vendor

Realtek

Vendor
CVE Published:
2 September 2025

What is CVE-2025-8300?

The Realtek RTL81XX SDK Wi-Fi Driver is susceptible to a heap-based buffer overflow vulnerability that enables local attackers to escalate privileges. The flaw is located in the N6CSet_DOT11_CIPHER_DEFAULT_KEY function, where user-supplied data is not properly validated before being copied into a fixed-length heap buffer. This lack of validation allows an attacker with low-privileged access to exploit the vulnerability, potentially executing arbitrary code with elevated SYSTEM privileges. Mitigating this vulnerability is crucial to ensuring the security and integrity of affected systems.

Affected Version(s)

rtl81xx SDK 1030.38.712.2019

References

CVSS V3.0

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-8300 : Heap-Based Buffer Overflow Vulnerability in Realtek RTL81XX SDK Wi-Fi Driver