CVE-2026-2616

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is advisable to modify the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc Exploit Third Party Advisory
https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc#reproduction-steps Exploit Third Party Advisory
https://vuldb.com/?ctiid.346266 VDB Entry Permissions Required
https://vuldb.com/?id.346266 Third Party Advisory VDB Entry
https://vuldb.com/?submit.751314 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*

History

19 Feb 2026, 19:56

Type Values Removed Values Added
References () https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc - () https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc - Exploit, Third Party Advisory
References () https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc#reproduction-steps - () https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc#reproduction-steps - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.346266 - () https://vuldb.com/?ctiid.346266 - VDB Entry, Permissions Required
References () https://vuldb.com/?id.346266 - () https://vuldb.com/?id.346266 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.751314 - () https://vuldb.com/?submit.751314 - Third Party Advisory, VDB Entry, Exploit
CPE cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
First Time Beetel 777vr1
Beetel
Beetel 777vr1 Firmware

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en Beetel 777VR1 hasta la versión 01.00.09. El elemento afectado es una función desconocida del componente Interfaz de Gestión Web. La manipulación conduce a credenciales codificadas de forma rígida. El ataque necesita ser iniciado dentro de la red local. El exploit ha sido divulgado al público y puede ser usado. Es aconsejable modificar los ajustes de configuración. El proveedor fue contactado tempranamente sobre esta divulgación, pero no respondió de ninguna manera.

17 Feb 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-17 15:16

Updated : 2026-02-19 19:56


NVD link : CVE-2026-2616

Mitre link : CVE-2026-2616

CVE.ORG link : CVE-2026-2616


JSON object : View

Products Affected

beetel

  • 777vr1_firmware
  • 777vr1
CWE
CWE-259

Use of Hard-coded Password

CWE-798

Use of Hard-coded Credentials