777vr1 Firmware

4 CVEs product

Monthly

CVE-2026-2617 MEDIUM POC This Month

The Beetel 777VR1 router's SSH/Telnet service contains insecure default initialization that allows local network attackers to achieve partial compromise of confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not released patches despite early notification. Affected devices running firmware version 01.00.09 and earlier require isolation from untrusted local networks until a security update becomes available.

Ssh Information Disclosure 777vr1 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-2616 HIGH POC This Week

Hard-coded credentials in the Beetel 777VR1 Web Management Interface allow unauthenticated attackers on the local network to gain full administrative access with high integrity and confidentiality impact. Public exploit code is available and actively used, with no patch currently available from the vendor. Affected organizations should immediately implement network segmentation and access controls to restrict management interface exposure.

Authentication Bypass 777vr1 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-1411 MEDIUM POC This Month

Improper access controls in the UART interface of Beetel 777VR1 firmware (up to version 01.00.09) allow attackers with physical access to bypass authentication mechanisms, though exploitation requires high technical complexity. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early notification.

Information Disclosure 777vr1 Firmware
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-1410 MEDIUM POC This Month

Missing authentication in the Beetel 777VR1 firmware (versions up to 01.00.09) UART interface allows an attacker with physical access to bypass security controls through a complex exploitation process. Public exploit code exists for this vulnerability, though no patch has been released and the vendor has not responded to disclosure attempts. The attack requires direct device access and significant technical sophistication but could result in complete system compromise.

Authentication Bypass 777vr1 Firmware
NVD GitHub VulDB
CVSS 3.1
6.4
EPSS
0.0%
CVE-2026-2617
EPSS 0% CVSS 6.3
MEDIUM POC This Month

The Beetel 777VR1 router's SSH/Telnet service contains insecure default initialization that allows local network attackers to achieve partial compromise of confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not released patches despite early notification. Affected devices running firmware version 01.00.09 and earlier require isolation from untrusted local networks until a security update becomes available.

Ssh Information Disclosure 777vr1 Firmware
NVD GitHub VulDB
CVE-2026-2616
EPSS 0% CVSS 8.8
HIGH POC This Week

Hard-coded credentials in the Beetel 777VR1 Web Management Interface allow unauthenticated attackers on the local network to gain full administrative access with high integrity and confidentiality impact. Public exploit code is available and actively used, with no patch currently available from the vendor. Affected organizations should immediately implement network segmentation and access controls to restrict management interface exposure.

Authentication Bypass 777vr1 Firmware
NVD GitHub VulDB
CVE-2026-1411
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Improper access controls in the UART interface of Beetel 777VR1 firmware (up to version 01.00.09) allow attackers with physical access to bypass authentication mechanisms, though exploitation requires high technical complexity. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early notification.

Information Disclosure 777vr1 Firmware
NVD GitHub VulDB
CVE-2026-1410
EPSS 0% CVSS 6.4
MEDIUM POC This Month

Missing authentication in the Beetel 777VR1 firmware (versions up to 01.00.09) UART interface allows an attacker with physical access to bypass security controls through a complex exploitation process. Public exploit code exists for this vulnerability, though no patch has been released and the vendor has not responded to disclosure attempts. The attack requires direct device access and significant technical sophistication but could result in complete system compromise.

Authentication Bypass 777vr1 Firmware
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy