Software catalogue for Realtek

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Realtek

Software catalogue for Realtek

A3002RU A702R Bluetooth HCI Adaptor CIK TELECOM MESH ROUTER Coship EMTA AP Fibergate FGN-R2 HCN MAX-C300N Hi-Wifi MAX-C300N IO-Data WN-AC1167R KCTVJEJU Wireless AP
N100RE N150RT N200RE N300RT N301RT N302R Realtek Audio COM Components Realtek Audio Driver Realtek Ethernet Controller Driver Realtek Jungle SDK


Showing elements 1 - 20 out of 40

  • Previous
  • 2
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2025090316: Multiple vulnerabilities in Realtek RTL8811AU Low
Patched
03.09.2025
SB2025090315: Multiple vulnerabilities in Realtek rtl81xx SDK Wi-Fi Driver Low
Patched
03.09.2025
SB2025060237: Privilege escalation in Realtek Bluetooth HCI Adaptor Low
Patched
02.06.2025
SB2022111611: Denial of service in Realtek RTL8195AM Low
Patched
16.11.2022
SB2021081709: Multiple vulnerabilities in Realtek SDK Critical
Patched Exploited
17.08.2021
SB2021060501: Remote code execution when parsing WPA2 key in Realtek WiFi chipsets Medium
Patched Public exploit
05.06.2021
SB2021020803: Multiple vulnerabilities in Realtek RTL8195AM, RTL8711AM, RTL8711AF and RTL8710AF devices High
Patched
08.02.2021
SB2020012742: OS Command Injection in several Realtek products Medium
Not patched
27.01.2020
SB2015042401: Remote code execution in Realtek SDK Critical
Not patched Exploited
24.04.2015

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or