A weakness has been identified in Beetel 777VR1 up to 01.00.09/01.00.09_55. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements. The physical device can be targeted for the attack. The attack requires a high level of complexity. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://gist.github.com/raghav20232023/9c51cbd91f3798b1c10f3f30fb631633 | Exploit Mitigation Third Party Advisory |
| https://vuldb.com/?ctiid.342797 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342797 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.739384 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Jan 2026, 20:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:* cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Beetel 777vr1
Beetel Beetel 777vr1 Firmware |
|
| References | () https://gist.github.com/raghav20232023/9c51cbd91f3798b1c10f3f30fb631633 - Exploit, Mitigation, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.342797 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.342797 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.739384 - Third Party Advisory, VDB Entry |
25 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-25 23:15
Updated : 2026-01-30 20:32
NVD link : CVE-2026-1408
Mitre link : CVE-2026-1408
CVE.ORG link : CVE-2026-1408
JSON object : View
Products Affected
beetel
- 777vr1_firmware
- 777vr1
CWE
CWE-521
Weak Password Requirements
