A flaw has been found in Beetel 777VR1 up to 01.00.09/01.00.09_55. The affected element is an unknown function of the component UART Interface. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The complexity of an attack is rather high. The exploitability is described as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://gist.github.com/raghav20232023/ea6adcd6d1eca35683570a1094164bd3 | Exploit Mitigation Third Party Advisory |
| https://vuldb.com/?ctiid.342800 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342800 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.740674 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Jan 2026, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Beetel 777vr1
Beetel Beetel 777vr1 Firmware |
|
| CPE | cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:* cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:* |
|
| References | () https://gist.github.com/raghav20232023/ea6adcd6d1eca35683570a1094164bd3 - Exploit, Mitigation, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.342800 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.342800 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.740674 - Third Party Advisory, VDB Entry |
26 Jan 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-26 01:15
Updated : 2026-01-30 20:19
NVD link : CVE-2026-1411
Mitre link : CVE-2026-1411
CVE.ORG link : CVE-2026-1411
JSON object : View
Products Affected
beetel
- 777vr1_firmware
- 777vr1
