Home

Description

A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. This manipulation causes risky cryptographic algorithm. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-02-17 | Published 2026-02-17 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
2.6AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR

Problem types

Risky Cryptographic Algorithm

Cryptographic Issues

Product status

01.00.09
affected

Timeline

2026-02-17:Advisory disclosed
2026-02-17:VulDB entry created
2026-02-21:VulDB entry last update

Credits

raghav_2026 (VulDB User) reporter

References

vuldb.com/?id.346268 (VDB-346268 | Beetel 777VR1 SSH Service risky encryption) vdb-entry technical-description

vuldb.com/?ctiid.346268 (VDB-346268 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.751633 (Submit #751633 | Beetel 777VR1 Firmware Versions: V01.00.09 / V01.00.09_55 Obsolete and Cryptographically Broken SSH Protocols CWE-327) third-party-advisory

gist.github.com/...20232023/8e8e559f80e2d596cb6154747f69a081 related

gist.github.com/...20232023/8e8e559f80e2d596cb6154747f69a081 exploit

cve.org (CVE-2026-2618)

nvd.nist.gov (CVE-2026-2618)

Download JSON