IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Hackers can exploit Realtek Wi-Fi module bug to gain root access to devices

Realtek has already patched some newer modules

Darkened image of a hacker wearing a hoodie using computing equipment

Security researchers have discovered several flaws in the Realtek RTL8195A Wi-Fi module that could allow cyber criminals to gain remote root access to the Wi-Fi module and ultimately take complete control of the device’s wireless communications.

According to a blog post by Israeli cyber security firm Vdoo, the module is a compact, low-power Wi-Fi module targeted at embedded-device users in the agriculture, automotive, energy, smart home, health care, gaming, and security industries.

The module uses Realtek’s "Ameba" API that allows developers to communicate via Wi-Fi, HTTP, mDNS, MQTT, and more.

While researchers verified the issues in only the RTL8195A module, they said the problems could extend to other modules, including the RTL8711AM, RTL8711AF, and RTL8710AF.

The most severe of the six flaws researchers found is a remote stack overflow that allows an attacker near an RTL8195 module to take it over. The attacker wouldn’t need the Wi-Fi network password (PSK), and it wouldn’t matter if the module is acting as a Wi-Fi access point or client. 

Attackers can also exploit two other flaws without knowing the PSK, and three other flaws require the network’s PSK as a prerequisite for the attack.

Researchers said any version of the module built after April 21, 2020  are not affected by the vulnerabilities, while modules built after March 3, 2020 are protected from the most severe stack overflow exploit but are still vulnerable to all other flaws and will need patching. 

Users can download an updated version of the Ameba SDK from Realtek’s website to patch systems. If users can’t update the device’s firmware, researchers advised using a strong, private WPA2 passphrase to prevent exploitation.

Stephen Kapp, CTO and founder of Cortex Insight, told ITPro that depending on the device function, there could be hundreds of devices, if not more, running vulnerable hardware modules.

“As a result, it is good practice to treat IoT devices as insecure by default and build controls around them to minimize risk.  In this case, for example, it is difficult to know what devices have the vulnerable Realtek Wi-Fi module within them,” Kapp said. 

Kapp said it could be impossible for end users to know if they need to update their device, making it the vendor’s responsibility to release an update that installs the patched firmware on the device. 

“It looks like the most serious of the vulnerabilities released in the Realtek 8195A module do not require knowledge of the Wi-Fi password to exploit and thus use affected devices to gain access to networks containing the device. Therefore, if possible, it is recommended to install any available firmware updates and ensure network-level controls are in place to minimize the risk of the device being used as a stepping-stone into a wider environment,” added Kapp.

Featured Resources

Three ways manual coding is killing your business productivity

...and how you can fix it

Free Download

Goodbye broadcasts, hello conversations

Drive conversations across the funnel with the WhatsApp Business Platform

Free Download

Winning with multi-cloud

How to drive a competitive advantage and overcome data integration challenges

Free Download

Talking to a business should feel like messaging a friend

Managing customer conversations at scale with the WhatsApp Business Platform

Free Download

Recommended

TP-Link Omada EAP650 review: An impressive Gigabit performer
wifi & hotspots

TP-Link Omada EAP650 review: An impressive Gigabit performer

16 Sep 2022
Escape the ransomware maze
Whitepaper

Escape the ransomware maze

23 Aug 2022
Twilio account breach result of sophisticated social engineering campaign
Security

Twilio account breach result of sophisticated social engineering campaign

9 Aug 2022
Over 200,000 DrayTek routers vulnerable to total device takeover
Security

Over 200,000 DrayTek routers vulnerable to total device takeover

3 Aug 2022

Most Popular

Vodafone UK confirms talks to merge with Three are underway
mergers and acquisitions

Vodafone UK confirms talks to merge with Three are underway

3 Oct 2022
BT's new platform promises to slash AI development time from months to days
artificial intelligence (AI)

BT's new platform promises to slash AI development time from months to days

3 Oct 2022
How to secure your hybrid workforce
Advertisement Feature

How to secure your hybrid workforce

23 Sep 2022