CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow via a certain ioctl message, issue 2 of 2.
Analysis
Buffer overflow in Samsung Exynos Wi-Fi drivers (980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, W1000) allows unauthenticated remote attackers to execute arbitrary code with high integrity/confidentiality impact through malformed NL80211 vendor command ioctl messages. Improper input validation enables network-accessible exploitation without user interaction. CVSS 9.8 critical severity. No public exploit identified at time of analysis.
Technical Context
Root cause: CWE-120 buffer overflow triggered via NL80211 vendor command handler processing within kernel Wi-Fi driver stack. Improper bounds checking on ioctl message parameters permits memory corruption. Affects Exynos mobile/wearable chipset firmware across multiple generations. CVSS AV:N indicates remotely exploitable attack surface through wireless network proximity.
Affected Products
Samsung Exynos processors: 980, 850, 1280, 1330, 1380, 1480, 1580 (mobile), W920, W930, W1000 (wearable). Impacts Wi-Fi driver components in chipset firmware. No standardized CPE available. Affects devices using listed Exynos variants.
Remediation
Vendor-released patch available per Samsung advisory at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-52909/. Device manufacturers using affected Exynos chipsets must integrate Samsung-provided firmware updates into system images. End users should apply OEM security patches when available through device update mechanisms. For unpatched devices, disable Wi-Fi functionality to eliminate network attack surface until firmware updates deploy. Monitor Samsung Security Updates portal for chipset-specific remediation timelines and affected device model lists.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209267
GHSA-j23g-4xqg-g9jh