CVE-2026-21381: About Qualcomm – Buffer Over-read in WLAN Firmware (14th Apr 2026)

Preface: WLAN (Wi-Fi/Bluetooth) System: This is handled by the Qualcomm FastConnect 7800 Mobile Connectivity System. It manages Wi-Fi 7 and Bluetooth protocols independently of the 5G modem.

While they are integrated onto the same Snapdragon 8 Gen 3 platform and work together for features like Dual-SIM Dual-Active (DSDA) and interference cancellation to ensure smooth handovers between cellular and Wi-Fi, their firmware and management systems remain functionally separate.

Background: The processing of Neighbour Awareness Networking (NAN) service data frames via Qualcomm FastConnect (or similar WLAN chipsets) inherently involves the WLAN firmware buffer.

When a WLAN chip (such as those in the Qualcomm FastConnect series) receives data frames via Neighbourhood Aware Network (NAN) connections, the firmware plays a central role in handling the data path before it reaches the host processor.

Ref: In Qualcomm FastConnect (and similar chipsets), “self-startup” refers to the firmware autonomous mode where the WLAN chip manages NAN Discovery Windows and frame matching internally without waking the main application processor (AP).

Vulnerability details: Transient DOS when receiving a service data frame with excessive length during device matching over a neighbourhood awareness network protocol connection.

Vulnerability Type – CWE-126 Buffer Over-read

Access Vector – Remote

Official announcement: Please refer to the link for details – https://nvd.nist.gov/vuln/detail/CVE-2026-21381

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.