Description
A weakness has been identified in Beetel 777VR1 up to 01.00.09/01.00.09_55. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements. The physical device can be targeted for the attack. The attack requires a high level of complexity. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
01.00.09_55
Timeline
| 2026-01-25: | Advisory disclosed |
| 2026-01-25: | VulDB entry created |
| 2026-01-31: | VulDB entry last update |
Credits
raghav_2026 (VulDB User)
References
vuldb.com/?id.342797 (VDB-342797 | Beetel 777VR1 UART weak password)
vuldb.com/?ctiid.342797 (VDB-342797 | CTI Indicators (IOB, IOC, TTP))
vuldb.com/?submit.739384 (Submit #739384 | Beetel Beetel 777VR1 Broadband Router Firmware Version: V01.00.09 / V01.00.09_55 CWE-521 — Weak Password Requirements)
gist.github.com/...20232023/9c51cbd91f3798b1c10f3f30fb631633