Home

Description

Bluetooth HCI Adaptor from Realtek has a Link Following vulnerability. Local attackers with regular privileges can create a symbolic link with the same name as a specific file, causing the product to delete arbitrary files pointed to by the link. Subsequently, attackers can leverage arbitrary file deletion to privilege escalation.

PUBLISHED Reserved 2024-11-27 | Published 2025-06-02 | Updated 2025-06-02 | Assigner twcert




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-59 Improper Link Resolution Before File Access ('Link Following')

Product status

Default status
unaffected

Any version before 1.1.73.1
affected

Credits

Crispr Xiang reporter

References

www.twcert.org.tw/tw/cp-132-10160-76012-1.html third-party-advisory

www.twcert.org.tw/en/cp-139-10161-fa1b5-2.html third-party-advisory

cve.org (CVE-2024-11857)

nvd.nist.gov (CVE-2024-11857)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.