Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| http://realtek.com |
|
| https://github.com/totekuh/CVE-2026-36355 |
|
Tue, 05 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Unchecked Debug IOCTLs in Realtek RTL8192CD Wi‑Fi Driver |
Tue, 05 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Kernel‑Wide Read/Write Access Control Flaw in Realtek RTL8192CD Wi‑Fi Driver | |
| Weaknesses | CWE-250 CWE-292 |
Tue, 05 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 CWE-782 CWE-787 |
|
| Metrics |
cvssV3_1
|
Tue, 05 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Kernel‑Wide Read/Write Access Control Flaw in Realtek RTL8192CD Wi‑Fi Driver | |
| Weaknesses | CWE-250 CWE-292 |
Tue, 05 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The rtl8192cd Wi-Fi kernel driver in the Realtek rtl819x Jungle SDK (all known versions through v3.4.14B) does not perform any access control checks on the write_mem (ioctl 0x89F5) and read_mem (ioctl 0x89F6) debug handlers, which are compiled into production builds via the unconditionally defined _IOCTL_DEBUG_CMD_ macro in 8192cd_cfg.h | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-05T17:19:32.920Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-36355
Updated: 2026-05-05T17:17:55.959Z
Status : Received
Published: 2026-05-05T14:16:08.737
Modified: 2026-05-05T18:16:02.310
Link: CVE-2026-36355
No data.
OpenCVE Enrichment
Updated: 2026-05-05T22:00:12Z