Vulnerabilities (CVE)

Filtered by vendor Arris Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-40038 1 Arris 4 Dg1670a, Dg1670a Firmware, Dg860a and 1 more 2024-01-04 N/A 8.8 HIGH
Arris DG860A and DG1670A devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. (They use the first 6 characters of the SSID and the last 6 characters of the BSSID, decrementing the last digit.)
CVE-2020-8438 1 Arris 2 Ruckus Zoneflex R500, Ruckus Zoneflex R500 Firmware 2020-01-31 9.0 HIGH 7.2 HIGH
Ruckus ZoneFlex R500 104.0.0.0.1347 devices allow an authenticated attacker to execute arbitrary OS commands via the hidden /forms/nslookupHandler form, as demonstrated by the nslookuptarget=|cat${IFS} substring.
CVE-2017-14116 2 Arris, Att 2 Nvg599, U-verse Firmware 2017-09-13 9.3 HIGH 8.1 HIGH
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG599 device, when IP Passthrough mode is not used, configures WAN access to a caserver https service with the tech account and an empty password, which allows remote attackers to obtain root privileges by establishing a session on port 49955 and then installing new software, such as BusyBox with "nc -l" support.
CVE-2017-9490 2 Arris, Cisco 4 Tg1682g, Tg1682g Firmware, Dpc3939b and 1 more 2017-08-08 6.8 MEDIUM 8.8 HIGH
The Comcast firmware on Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows configuration changes via CSRF.