Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
1 vulnerability found for 7486e by compal
VAR-202001-0738
Vulnerability from variot - Updated: 2024-11-23 21:59Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11. plural Broadcom The base cable modem contains a classic buffer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Sagemcom F@st 5260 and Sagemcom F@st 3890 are routers. Technicolor TC7230 STEB is a wireless router
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202001-0738",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "tc7230 steb",
"scope": "eq",
"trust": 2.4,
"vendor": "technicolor",
"version": "01.25"
},
{
"model": "c6250emr",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "2.01.05"
},
{
"model": "c6250emr",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "2.01.03"
},
{
"model": "cg3700emr",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "2.01.05"
},
{
"model": "cg3700emr",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "2.01.03"
},
{
"model": "f\\@st 3890",
"scope": "lt",
"trust": 1.0,
"vendor": "sagemcom",
"version": "50.10.21_t4"
},
{
"model": "7284e",
"scope": "eq",
"trust": 1.0,
"vendor": "compal",
"version": "5.510.5.11"
},
{
"model": "f\\@st 3686",
"scope": "eq",
"trust": 1.0,
"vendor": "sagemcom",
"version": "3.428.0"
},
{
"model": "f\\@st 3890",
"scope": "lt",
"trust": 1.0,
"vendor": "sagemcom",
"version": "05.76.6.3f"
},
{
"model": "7486e",
"scope": "eq",
"trust": 1.0,
"vendor": "compal",
"version": "5.510.5.11"
},
{
"model": "f\\@st 3686",
"scope": "eq",
"trust": 1.0,
"vendor": "sagemcom",
"version": "4.83.0"
},
{
"model": "f@st 3890",
"scope": "lt",
"trust": 0.8,
"vendor": "sagemcom",
"version": "05.76.6.3f"
},
{
"model": "7284e",
"scope": "eq",
"trust": 0.8,
"vendor": "compal broadband",
"version": "5.510.5.11"
},
{
"model": "7486e",
"scope": "eq",
"trust": 0.8,
"vendor": "compal broadband",
"version": "5.510.5.11"
},
{
"model": "f@st 3890",
"scope": "eq",
"trust": 0.8,
"vendor": "sagemcom",
"version": null
},
{
"model": "f@st 3890",
"scope": "lt",
"trust": 0.8,
"vendor": "sagemcom",
"version": "50.10.21_t4"
},
{
"model": "c6250emr",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": "2.01.03"
},
{
"model": "c6250emr",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": "2.01.05"
},
{
"model": "f@st 3686",
"scope": "eq",
"trust": 0.8,
"vendor": "sagemcom",
"version": "3.428.0"
},
{
"model": "cg3700emr",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": "2.01.05"
},
{
"model": "cg3700emr",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": "2.01.03"
},
{
"model": "f@st 3686",
"scope": "eq",
"trust": 0.8,
"vendor": "sagemcom",
"version": "4.83.0"
},
{
"model": "f@st \u003c50.10.21 t4",
"scope": "eq",
"trust": 0.6,
"vendor": "sagemcom",
"version": "3890"
},
{
"model": "f@st \u003c05.76.6.3f",
"scope": "eq",
"trust": 0.6,
"vendor": "sagemcom",
"version": "3890"
},
{
"model": "f@st",
"scope": "eq",
"trust": 0.6,
"vendor": "sagemcom",
"version": "36863.428.0"
},
{
"model": "f@st",
"scope": "eq",
"trust": 0.6,
"vendor": "sagemcom",
"version": "36864.83.0"
},
{
"model": "compal 7486e",
"scope": "eq",
"trust": 0.6,
"vendor": "technicolor",
"version": "5.510.5.11"
},
{
"model": "compal 7284e",
"scope": "eq",
"trust": 0.6,
"vendor": "technicolor",
"version": "5.510.5.11"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"cve": "CVE-2019-19494",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2019-19494",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CNVD-2020-23485",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2019-19494",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-19494",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-19494",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-19494",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-23485",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202001-311",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-19494",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "CNNVD",
"id": "CNNVD-202001-311"
},
{
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim\u0027s browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11. plural Broadcom The base cable modem contains a classic buffer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Sagemcom F@st 5260 and Sagemcom F@st 3890 are routers. Technicolor TC7230 STEB is a wireless router",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-19494"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"db": "VULMON",
"id": "CVE-2019-19494"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-19494",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-23485",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202001-311",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2019-19494",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "CNNVD",
"id": "CNNVD-202001-311"
},
{
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"id": "VAR-202001-0738",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
}
],
"trust": 1.2474206366666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
}
]
},
"last_update_date": "2024-11-23T21:59:31.876000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top\u00a0Page",
"trust": 0.8,
"url": "https://www.broadcom.com/"
},
{
"title": "The Register",
"trust": 0.2,
"url": "https://www.theregister.co.uk/2020/01/10/broadcom_cable_haunt_vulnerability/"
},
{
"title": "welivesecurity",
"trust": 0.1,
"url": "https://www.welivesecurity.com/2020/01/14/millions-modems-vulnerable-remote-hijacking/"
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/cable-haunt-remote-code-execution/151756/"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://github.com/lyrebirds/cable-haunt-report/releases/download/2.4/report.pdf"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-19494"
},
{
"trust": 1.7,
"url": "https://cablehaunt.com"
},
{
"trust": 1.7,
"url": "https://www.broadcom.com"
},
{
"trust": 1.7,
"url": "https://github.com/lyrebirds/fast8690-exploit"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/120.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://threatpost.com/cable-haunt-remote-code-execution/151756/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "CNNVD",
"id": "CNNVD-202001-311"
},
{
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"db": "CNNVD",
"id": "CNNVD-202001-311"
},
{
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-04-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"date": "2020-01-09T00:00:00",
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"date": "2020-02-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"date": "2020-01-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202001-311"
},
{
"date": "2020-01-09T13:15:10.993000",
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-04-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-23485"
},
{
"date": "2020-01-28T00:00:00",
"db": "VULMON",
"id": "CVE-2019-19494"
},
{
"date": "2020-02-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-014302"
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202001-311"
},
{
"date": "2024-11-21T04:34:50.037000",
"db": "NVD",
"id": "CVE-2019-19494"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202001-311"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Broadcom\u00a0 -Based cable modem vulnerable to classical buffer overflow",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-014302"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202001-311"
}
],
"trust": 0.6
}
}