CVE-2025-8301

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Realtek RTL8811AU wireless driver allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level. This affects systems using vulnerable versions of the Realtek RTL8811AU driver. Attackers must first gain local code execution to exploit this vulnerability.

💻 Affected Systems

Products:
  • Realtek RTL8811AU Wireless LAN 802.11ac USB NIC Driver
Versions: Versions prior to patched release (specific version unknown from provided data)
Operating Systems: Windows (driver is rtwlanu.sys)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Realtek RTL8811AU USB wireless adapters using vulnerable driver versions. Driver must be loaded and active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement capabilities.

🟠

Likely Case

Local attacker with initial access escalates to SYSTEM privileges to install malware, steal credentials, or maintain persistence on compromised systems.

🟢

If Mitigated

With proper privilege separation and driver signing enforcement, impact limited to denial of service or driver crashes.

🌐 Internet-Facing: LOW - Requires local access, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers on compromised systems can escalate to full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local code execution first, then exploitation of heap overflow in driver function. ZDI advisory suggests exploit development is feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check Realtek or device manufacturer updates

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-880/

Restart Required: Yes

Instructions:

1. Check device manufacturer website for updated RTL8811AU driver. 2. Download and install latest driver. 3. Reboot system to load new driver.

🔧 Temporary Workarounds

Disable vulnerable driver

windows

Disable or uninstall the Realtek RTL8811AU driver if not needed

sc config rtwlanu start= disabled
pnputil /remove-device "USB\VID_0BDA&PID_8811"

Restrict driver loading

windows

Use driver block rules to prevent vulnerable driver loading

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Driver Security" /v "DriverBlockPolicy" /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict privilege separation - ensure users operate with minimal necessary privileges
  • Monitor for suspicious driver loading events and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check driver version: Open Device Manager > Network adapters > Realtek RTL8811AU > Properties > Driver tab

Check Version:

driverquery /v | findstr /i rtwlanu

Verify Fix Applied:

Verify driver version is updated and no longer matches vulnerable versions. Check that rtwlanu.sys file date is recent.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4697 (Service installed), suspicious driver loading
  • Unexpected SYSTEM privilege processes from user accounts
  • Driver crash events for rtwlanu.sys

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4697 AND ServiceName="rtwlanu" OR ProcessName="rtwlanu.sys" AND ParentProcess NOT IN ("services.exe", "svchost.exe")

🔗 References

📤 Share & Export