A vulnerability was detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. Impacted is an unknown function of the component UART Interface. The manipulation results in missing authentication. An attack on the physical device is feasible. This attack is characterized by high complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://gist.github.com/raghav20232023/96a6b13ab00c493d21362e744627ea9f | Exploit Mitigation Third Party Advisory |
| https://vuldb.com/?ctiid.342799 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342799 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.739433 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Jan 2026, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:* cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Beetel 777vr1
Beetel Beetel 777vr1 Firmware |
|
| References | () https://gist.github.com/raghav20232023/96a6b13ab00c493d21362e744627ea9f - Exploit, Mitigation, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.342799 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.342799 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.739433 - Third Party Advisory, VDB Entry |
26 Jan 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-26 01:15
Updated : 2026-01-30 20:24
NVD link : CVE-2026-1410
Mitre link : CVE-2026-1410
CVE.ORG link : CVE-2026-1410
JSON object : View
Products Affected
beetel
- 777vr1_firmware
- 777vr1
