Impact
The bug occurs in the Linux rtw88 Wi‑Fi driver for the 8822b chip. When the userspace command to set the antenna is called while the chip is powered off, the driver attempts to read RF registers that return unexpected values. This triggers a kernel warning in rtw8822b_config_trx_mode(). The warning does not crash the kernel, but it indicates an improper state check and could lead to repeated warnings or subtle instability if abused.
Affected Systems
Linux kernel installations that include the rtw88 module for the 8822b Wi‑Fi chipset, such as the 6.17.5‑arch1‑1 kernel shown in the trace. Any Linux system that uses this driver and allows userspace to issue antenna configuration commands (such as via nl80211) is affected.
Risk and Exploitability
The CVSS score is 5.5, and no EPSS data is provided, but the vulnerability was already fixed in the upstream kernel. The attack vector would require userspace access to the nl80211 interface, which normally requires CAP_NET_ADMIN privileges. While the warning itself is not a direct exploit, repeated triggering could generate excessive logs or contribute to a denial‑of‑service scenario. The risk is considered moderate; no known remote code execution or privilege escalation is documented. The vulnerability is not in the CISA KEV catalog.
OpenCVE Enrichment