{"vulnerability": "cve-2020-3657", "sightings": [{"uuid": "1d1901ca-7dcf-4ee9-bc0e-83acb9c69be8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-3657", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1943", "content": "#Threat_Research\nMajor Vulnerabilities Discovered in Qualcomm QCMAP (Qualcomm Mobile Access Point) \n(CVE-2020-25858, CVE-2020-3657, CVE-2020-25859)\nhttps://www.vdoo.com/blog/qualcomm-qcmap-vulnerabilities", "creation_timestamp": "2022-11-27T19:25:16.000000Z"}, {"uuid": "744cbfcc-018d-44a1-9df2-2268e645ab29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-3657", "type": "seen", "source": "https://t.me/cibsecurity/15762", "content": "\u203c CVE-2020-3657 \u203c\n\nu'Remote code execution can happen by sending a carefully crafted POST query when Device configuration is accessed from a tethered client through webserver due to lack of array bound check.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6574AU, QCS405, QCS610, QRB5165, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8250\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-02T12:38:36.000000Z"}]}