Home

Description

A weakness has been identified in Beetel 777VR1 up to 01.00.09/01.00.09_55. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements. The physical device can be targeted for the attack. The attack requires a high level of complexity. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-01-25 | Published 2026-01-25 | Updated 2026-02-23 | Assigner VulDB




LOW: 1.0CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 2.0CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 2.0CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
1.2AV:L/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Weak Password Requirements

Product status

01.00.09
affected

01.00.09_55
affected

Timeline

2026-01-25:Advisory disclosed
2026-01-25:VulDB entry created
2026-01-31:VulDB entry last update

Credits

raghav_2026 (VulDB User) reporter

References

vuldb.com/?id.342797 (VDB-342797 | Beetel 777VR1 UART weak password) vdb-entry technical-description

vuldb.com/?ctiid.342797 (VDB-342797 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.739384 (Submit #739384 | Beetel Beetel 777VR1 Broadband Router Firmware Version: V01.00.09 / V01.00.09_55 CWE-521 — Weak Password Requirements) third-party-advisory

gist.github.com/...20232023/9c51cbd91f3798b1c10f3f30fb631633 exploit

cve.org (CVE-2026-1408)

nvd.nist.gov (CVE-2026-1408)

Download JSON