### [CVE-2022-32654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32654) ![](https://img.shields.io/static/v1?label=Product&message=MT5221%2C%20MT7603%2C%20MT7613%2C%20MT7615%2C%20MT7622%2C%20MT7628%2C%20MT7629%2C%20MT7663%2C%20MT7668%2C%20MT7682%2C%20MT7686%2C%20MT7687%2C%20MT7697%2C%20MT7902%2C%20MT7915%2C%20MT7916%2C%20MT7921%2C%20MT7933%2C%20MT7981%2C%20MT7986%2C%20MT8167S%2C%20MT8175%2C%20MT8362A%2C%20MT8365%2C%20MT8385%2C%20MT8518S%2C%20MT8532%2C%20MT8695%2C%20MT8696%2C%20MT8788&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) ### Description In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705011; Issue ID: GN20220705011. ### POC #### Reference No PoCs from references. #### Github - https://github.com/efchatz/WPAxFuzz