Description
The rtl8192cd Wi-Fi kernel driver in the Realtek rtl819x Jungle SDK (all known versions through v3.4.14B) does not perform any access control checks on the write_mem (ioctl 0x89F5) and read_mem (ioctl 0x89F6) debug handlers, which are compiled into production builds via the unconditionally defined _IOCTL_DEBUG_CMD_ macro in 8192cd_cfg.h
Published: 2026-05-05
Score: 7.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The rtl8192cd Wi‑Fi kernel driver for Realtek’s rtl819x Jungle SDK contains two debug ioctl handlers, write_mem (0x89F5) and read_mem (0x89F6), that are always compiled into production builds because the _IOCTL_DEBUG_CMD_ macro is unconditionally defined. These handlers perform no access‑control checks, allowing any user who can open the driver’s device file to read or write arbitrary kernel memory. By manipulating kernel memory, an attacker could inject malicious code or modify critical data, resulting in local privilege escalation or system instability.

Affected Systems

This weakness applies to all Realtek RTL8192CD Wi‑Fi driver versions shipped in the rtl819x Jungle SDK up through firmware v3.4.14B. The driver is commonly found in consumer routers, embedded devices, and NICs that use the RTL8192CD chipset. While the operating system is not explicitly specified, any Linux kernel that loads the driver is potentially affected.

Risk and Exploitability

The CVSS score is not disclosed, but the lack of access control on privileged kernel operations is a high‑severity flaw. The EPSS score is unavailable and the vulnerability is not listed in CISA’s KEV catalog, indicating limited known exploitation. Nevertheless, because the flaw is local and can be triggered by any user with access to the driver’s device node, the likelihood of exploitation is significant in environments where the device node permissions are lax. The attack vector is inferred to be local, requiring only driver access; no network or remote entry is described.

Generated by OpenCVE AI on May 5, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an updated Realtek firmware or driver that removes the _IOCTL_DEBUG_CMD_ macro or implements proper access‑control checks and apply the update if available
  • Recompile the rtl8192cd driver from source with the _IOCTL_DEBUG_CMD_ macro undefined to exclude the debug handlers from production builds
  • Restrict permissions on the driver’s device node (e.g., /dev/rt_wlan0) so that only privileged users can access it, or use udev rules to enforce stricter ownership

Generated by OpenCVE AI on May 5, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-782
CWE-787
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 May 2026 16:00:00 +0000

Type Values Removed Values Added
Title Kernel‑Wide Read/Write Access Control Flaw in Realtek RTL8192CD Wi‑Fi Driver
Weaknesses CWE-250
CWE-292

Tue, 05 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description The rtl8192cd Wi-Fi kernel driver in the Realtek rtl819x Jungle SDK (all known versions through v3.4.14B) does not perform any access control checks on the write_mem (ioctl 0x89F5) and read_mem (ioctl 0x89F6) debug handlers, which are compiled into production builds via the unconditionally defined _IOCTL_DEBUG_CMD_ macro in 8192cd_cfg.h
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-05T17:19:32.920Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-36355

cve-icon Vulnrichment

Updated: 2026-05-05T17:17:55.959Z

cve-icon NVD

Status : Received

Published: 2026-05-05T14:16:08.737

Modified: 2026-05-05T18:16:02.310

Link: CVE-2026-36355

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T16:00:18Z