CVE-2025-52909

| EUVD-2025-209267 CRITICAL
2026-04-07 mitre GHSA-j23g-4xqg-g9jh
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 07, 2026 - 15:00 vuln.today
EUVD ID Assigned
Apr 07, 2026 - 15:00 euvd
EUVD-2025-209267
CVE Published
Apr 07, 2026 - 00:00 nvd
CRITICAL 9.8

Description

An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow via a certain ioctl message, issue 2 of 2.

Analysis

Buffer overflow in Samsung Exynos Wi-Fi drivers (980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, W1000) allows unauthenticated remote attackers to execute arbitrary code with high integrity/confidentiality impact through malformed NL80211 vendor command ioctl messages. Improper input validation enables network-accessible exploitation without user interaction. CVSS 9.8 critical severity. No public exploit identified at time of analysis.

Technical Context

Root cause: CWE-120 buffer overflow triggered via NL80211 vendor command handler processing within kernel Wi-Fi driver stack. Improper bounds checking on ioctl message parameters permits memory corruption. Affects Exynos mobile/wearable chipset firmware across multiple generations. CVSS AV:N indicates remotely exploitable attack surface through wireless network proximity.

Affected Products

Samsung Exynos processors: 980, 850, 1280, 1330, 1380, 1480, 1580 (mobile), W920, W930, W1000 (wearable). Impacts Wi-Fi driver components in chipset firmware. No standardized CPE available. Affects devices using listed Exynos variants.

Remediation

Vendor-released patch available per Samsung advisory at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-52909/. Device manufacturers using affected Exynos chipsets must integrate Samsung-provided firmware updates into system images. End users should apply OEM security patches when available through device update mechanisms. For unpatched devices, disable Wi-Fi functionality to eliminate network attack surface until firmware updates deploy. Monitor Samsung Security Updates portal for chipset-specific remediation timelines and affected device model lists.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: 0

Share

CVE-2025-52909 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy