CVE-2026-1409

A security vulnerability has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack on the physical device. The attack's complexity is rated as high. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/raghav20232023/19900b427445adf37f64ae953611bfce Exploit Mitigation Third Party Advisory
https://vuldb.com/?ctiid.342798 Permissions Required VDB Entry
https://vuldb.com/?id.342798 Third Party Advisory VDB Entry
https://vuldb.com/?submit.739399 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-26 00:16

Updated : 2026-01-30 20:27


NVD link : CVE-2026-1409

Mitre link : CVE-2026-1409

CVE.ORG link : CVE-2026-1409


JSON object : View

Products Affected

beetel

  • 777vr1_firmware
  • 777vr1
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts

CWE-799

Improper Control of Interaction Frequency