CVE-2026-2617

A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0 Exploit Third Party Advisory
https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproduce Exploit Third Party Advisory
https://vuldb.com/?ctiid.346267 VDB Entry Permissions Required
https://vuldb.com/?id.346267 Third Party Advisory VDB Entry
https://vuldb.com/?submit.751436 Third Party Advisory VDB Entry Exploit
https://vuldb.com/?submit.751568 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*

History

19 Feb 2026, 19:51

Type Values Removed Values Added
References () https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0 - () https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0 - Exploit, Third Party Advisory
References () https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproduce - () https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproduce - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.346267 - () https://vuldb.com/?ctiid.346267 - VDB Entry, Permissions Required
References () https://vuldb.com/?id.346267 - () https://vuldb.com/?id.346267 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.751436 - () https://vuldb.com/?submit.751436 - Third Party Advisory, VDB Entry, Exploit
References () https://vuldb.com/?submit.751568 - () https://vuldb.com/?submit.751568 - Third Party Advisory, VDB Entry, Exploit
CPE cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
First Time Beetel 777vr1
Beetel
Beetel 777vr1 Firmware

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Beetel 777VR1 hasta 01.00.09. Esto afecta una función desconocida del componente Servicio Telnet/Servicio SSH. La manipulación resulta en una inicialización predeterminada insegura de recurso. El ataque solo puede realizarse desde la red local. El exploit ha sido hecho público y podría ser usado. El proveedor fue contactado tempranamente sobre esta divulgación, pero no respondió de ninguna manera.

17 Feb 2026, 16:20

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-17 16:20

Updated : 2026-02-19 19:51


NVD link : CVE-2026-2617

Mitre link : CVE-2026-2617

CVE.ORG link : CVE-2026-2617


JSON object : View

Products Affected

beetel

  • 777vr1_firmware
  • 777vr1
CWE
CWE-1188

Insecure Default Initialization of Resource