Description
Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- none
- User Action
- required
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-120
Metadata
- Primary Vendor
- SAGEMCOM
- Published
- 1/9/2020
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
sagemcom : f\@st_3890_firmwaresagemcom : f\@st_3890_firmwaresagemcom : f\@st_3686_firmwaresagemcom : f\@st_3686_firmwarenetgear : cg3700emr_firmwarenetgear : cg3700emr_firmwarenetgear : c6250emr_firmwarenetgear : c6250emr_firmwaretechnicolor : tc7230_steb_firmwarecompal : 7284e_firmwarecompal : 7486e_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.