CVE-2026-2617
Plain English Summary
AI-powered analysis for quick understanding
An attacker on the local network can exploit a flaw in the Beetel 777VR1 firmware to gain unauthorized access to the device by taking advantage of insecure default settings in its Telnet and SSH services. This vulnerability is particularly concerning because it has been publicly disclosed, and the vendor has not responded to warnings about it.
Technical Description
A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 17, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago
Vendor
beetel
Product
777vr1 firmware
Related Vulnerabilities
This vulnerability allows an attacker to potentially exploit the SSH service on Beetel 777VR1 routers, which could lead to the use of weak cryptographic methods, compromising the security of communications. Although the attack can be done remotely, it is complex and difficult to execute, and the vendor has not responded to reports about the issue.
This vulnerability allows an attacker on the same local network to access the web management interface of the Beetel 777VR1 router using hard-coded credentials, which could give them full control over the device. Since the exploit requires local network access, it poses a risk primarily in environments where unauthorized users can connect to the network.