Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-16836Cross-site Scripting in Arris Tg1682g Firmware

Severity
6.1MEDIUMNVD
EPSS
0.3%
top 48.63%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 16
Latest updateMay 13

Description

Arris TG1682G devices with Comcast TG1682_2.0s7_PRODse 10.0.59.SIP.PC20.CT software allow Unauthenticated Stored XSS via the actionHandler/ajax_managed_services.php service parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages1 packages

NVDcommscope/arris_tg1682g_firmware10.0.59.sip.pc20.ct

🔴Vulnerability Details

2
GHSA
GHSA-wfv9-xvh7-763f: Arris TG1682G devices with Comcast TG1682_22022-05-13
CVEList
CVE-2017-16836: Arris TG1682G devices with Comcast TG1682_22017-11-16

💥Exploits & PoCs

1
Exploit-DB
Arris TG1682G Modem - Persistent Cross-Site Scripting2015-11-09
CVE-2017-16836 — Cross-site Scripting | cvebase