CVE-2019-19494

Summary

CVECVE-2019-19494
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2020-01-09 13:15:00 UTC
Updated2020-01-28 19:43:00 UTC
DescriptionBroadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.

Risk And Classification

Problem Types: CWE-120

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Compal 7284e - All All All
Hardware Compal 7284e - All All All
Operating System Compal 7284e Firmware 5.510.5.11 All All All
Operating System Compal 7284e Firmware 5.510.5.11 All All All
Hardware Compal 7486e - All All All
Hardware Compal 7486e - All All All
Operating System Compal 7486e Firmware 5.510.5.11 All All All
Operating System Compal 7486e Firmware 5.510.5.11 All All All
Hardware Netgear C6250emr - All All All
Hardware Netgear C6250emr - All All All
Operating System Netgear C6250emr Firmware 2.01.03 All All All
Operating System Netgear C6250emr Firmware 2.01.05 All All All
Operating System Netgear C6250emr Firmware 2.01.03 All All All
Operating System Netgear C6250emr Firmware 2.01.05 All All All
Hardware Netgear Cg3700emr - All All All
Hardware Netgear Cg3700emr - All All All
Operating System Netgear Cg3700emr Firmware 2.01.03 All All All
Operating System Netgear Cg3700emr Firmware 2.01.05 All All All
Operating System Netgear Cg3700emr Firmware 2.01.03 All All All
Operating System Netgear Cg3700emr Firmware 2.01.05 All All All
Hardware Sagemcom F@st 3686 - All All All
Operating System Sagemcom F@st 3686 Firmware 3.428.0 All All All
Operating System Sagemcom F@st 3686 Firmware 4.83.0 All All All
Hardware Sagemcom F@st 3890 - All All All
Operating System Sagemcom F@st 3890 Firmware All All All All
Hardware Sagemcom F@st 3686 - All All All
Hardware Sagemcom F@st 3686 - All All All
Operating System Sagemcom F@st 3686 Firmware 3.428.0 All All All
Operating System Sagemcom F@st 3686 Firmware 4.83.0 All All All
Operating System Sagemcom F@st 3686 Firmware 3.428.0 All All All
Operating System Sagemcom F@st 3686 Firmware 4.83.0 All All All
Hardware Sagemcom F@st 3890 - All All All
Hardware Sagemcom F@st 3890 - All All All
Operating System Sagemcom F@st 3890 Firmware All All All All
Operating System Sagemcom F@st 3890 Firmware All All All All
Hardware Technicolor Tc7230 Steb - All All All
Hardware Technicolor Tc7230 Steb - All All All
Operating System Technicolor Tc7230 Steb Firmware 01.25 All All All
Operating System Technicolor Tc7230 Steb Firmware 01.25 All All All

References

ReferenceSourceLinkTags
github.com/Lyrebirds/Cable-Haunt-Report/releases/download/2.4/report.pdf MISC github.com Technical Description, Third Party Advisory
Broadcom Inc. | Connecting Everything MISC www.broadcom.com Product
cablehaunt.com MISC cablehaunt.com Exploit, Technical Description, Third Party Advisory
GitHub - Lyrebirds/Fast8690-exploit MISC github.com Exploit, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report