EUVD-2025-209266

| CVE-2025-52908 CRITICAL
2026-04-07 mitre GHSA-326f-rc6r-57wf
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 07, 2026 - 15:30 vuln.today
EUVD ID Assigned
Apr 07, 2026 - 15:30 euvd
EUVD-2025-209266
CVE Published
Apr 07, 2026 - 00:00 nvd
CRITICAL 9.8

Description

An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow via a certain ioctl message, issue 1 of 2.

Analysis

Buffer overflow in Samsung Exynos Wi-Fi driver (980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, W1000) allows unauthenticated remote code execution via malformed NL80211 vendor command ioctl message. Incorrect handling of vendor-specific wireless configuration commands enables network-based memory corruption. CVSS 9.8 critical severity reflects network attack vector requiring no authentication or user interaction. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.01%).

Technical Context

Root cause is CWE-120 buffer overflow in Exynos chipset Wi-Fi driver's NL80211 vendor command parser. Improper bounds checking when processing ioctl messages to nl80211 vendor-specific interface allows attacker-controlled data to overflow allocated buffer. Network Layer 80211 (nl80211) cfg80211 kernel interface mishandles vendor command extension parsing, enabling memory corruption through crafted wireless management frames.

Affected Products

Samsung Mobile Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580. Samsung Wearable Processor Exynos W920, W930, W1000. All versions of affected chipsets prior to security update. No CPE enumeration available.

Remediation

Vendor-released patch: Apply Samsung Semiconductor security updates per advisory at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-52908/. Device manufacturers using affected Exynos chipsets must integrate firmware updates into Android/Tizen security patches and push OTA updates to end-user devices. Check device manufacturer security bulletins for model-specific patch availability timelines. No workaround exists for kernel-level driver vulnerability; disable Wi-Fi on affected devices until patched if exposure to untrusted networks is unavoidable. Monitor Samsung's product security portal for chipset-specific firmware versions and integration guidance for OEMs.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: 0

Share

EUVD-2025-209266 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy