CVE-2025-36887
In · In Multiple Products
**A high-severity vulnerability in the Wi-Fi scanning component could allow a proximate attacker to trigger a denial of service or potentially execute arbitrary code.**.
Executive summary
A high-severity vulnerability in the Wi-Fi scanning component could allow a proximate attacker to trigger a denial of service or potentially execute arbitrary code.
Vulnerability
An unspecified flaw is present in the wl_cfgscan_update_v3_schedscan_results() function of the wl_cfgscan module. This suggests a vulnerability in the processing of scheduled Wi-Fi scan results, which could be triggered by a remote, unauthenticated attacker broadcasting malicious Wi-Fi frames that are captured by the device.
Business impact
Exploitation of this flaw could cause the Wi-Fi driver or a related system service to crash, resulting in a denial of service and loss of network connectivity. If the vulnerability is a memory corruption issue, it could potentially be leveraged for remote code execution. The CVSS score of 7.8 (High) highlights the significant threat from an attacker who is merely in physical proximity to the device.
Remediation
Immediate Action: Apply the latest firmware or driver updates from the vendor that address this vulnerability in the Wi-Fi subsystem.
Proactive Monitoring: Monitor system logs for evidence of Wi-Fi driver crashes or kernel panics. A Wireless Intrusion Detection System (WIDS) may help identify anomalous wireless traffic.
Compensating Controls: If a patch cannot be applied immediately, the only surefire mitigation is to disable the Wi-Fi interface on the affected device to remove the attack surface.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This is a critical vulnerability that exposes affected devices to remote attack from anyone within Wi-Fi range. It is imperative that the vendor's patches are deployed immediately to prevent potential device compromise or denial of service.