Browse all 7 CVE security advisories affecting Arris. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Arris develops networking equipment, primarily cable modems and routers for residential and business use. Historically, vulnerabilities in their products have commonly included remote code execution, cross-site scripting, and privilege escalation flaws. Security researchers have identified authentication bypass issues and insecure default configurations in multiple device models. While no major public security incidents have been widely documented, the presence of seven CVEs indicates ongoing security concerns. Their devices, often deployed in critical infrastructure, require regular firmware updates to mitigate potential exploitation risks. The company has faced criticism for slow patch deployment processes in some cases.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-5196 | Arris VAP2500 tools_command.php command injection — VAP2500CWE-77 | 4.7 | Medium | 2024-05-22 |
| CVE-2024-5195 | Arris VAP2500 diag_s.php command injection — VAP2500CWE-77 | 4.7 | Medium | 2024-05-22 |
| CVE-2024-5194 | Arris VAP2500 assoc_table.php command injection — VAP2500CWE-77 | 4.7 | Medium | 2024-05-22 |
This page lists every published CVE security advisory associated with Arris. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.