This exploit uses the Cable Haunt vulnerability to open a
shell for the Sagemcom F@ST 3890 (50_10_19-T1) cable modem. The
exploit serves a website that sends a malicious websocket request
to the cable modem. The request will overflow a return address in
the spectrum analyzer of the cable modem and using a rop chain
start listening for a tcp connection on port 1337. The server will
then send a payload over this tcp connection and the modem will
start executing the payload. The payload will listen for commands
to be run in the eCos shell on the cable modem and redirect STDOUT
to the tcp connection.