Home

Description

A security flaw has been discovered in Beetel 777VR1 up to 01.00.09/01.00.09_55. This affects an unknown part of the component UART Interface. Performing a manipulation results in information disclosure. The attack may be carried out on the physical device. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-01-25 | Published 2026-01-25 | Updated 2026-02-23 | Assigner VulDB




LOW: 1.0CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 2.0CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 2.0CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
1.2AV:L/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Information Disclosure

Improper Access Controls

Product status

01.00.09
affected

01.00.09_55
affected

Timeline

2026-01-25:Advisory disclosed
2026-01-25:VulDB entry created
2026-01-31:VulDB entry last update

Credits

raghav_2026 (VulDB User) reporter

References

vuldb.com/?id.342796 (VDB-342796 | Beetel 777VR1 UART information disclosure) vdb-entry technical-description

vuldb.com/?ctiid.342796 (VDB-342796 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.736322 (Submit #736322 | Beetel Beetel 777VR1 Broadband Router Firmware Version: V01.00.09 / V01.00.09_55 Cleartext Exposure of Sensitive Credentials in Boot Logs - UART) third-party-advisory

gist.github.com/...20232023/253c041842f622d9c2cb6ee4111c2227 exploit

cve.org (CVE-2026-1407)

nvd.nist.gov (CVE-2026-1407)

Download JSON