Description
A security flaw has been discovered in Beetel 777VR1 up to 01.00.09/01.00.09_55. This affects an unknown part of the component UART Interface. Performing a manipulation results in information disclosure. The attack may be carried out on the physical device. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-25
Score: 1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Assess
AI Analysis

Impact

The vulnerability exists in the Beetel 777VR1 UART interface. A manipulation of this interface can disclose sensitive information from the device, exposing data that should not be publicly accessible. The weakness arises from insufficient protection of data in transit and a lack of proper access control, as confirmed by the associated CWE-200 and CWE-284 identifiers.

Affected Systems

Beetel 777VR1 networking devices running firmware versions up to 01.00.09 or 01.00.09_55 are affected by this information‑disclosure flaw.

Risk and Exploitability

The CVSS score indicates a low overall severity, but the vulnerability has been publicly released and can be exploited through physical access to the device. The exploitability score is low (EPSS < 1 %), suggesting limited exploitation probability, and the attack complexity is high. The flaw is not listed in the CISA KEV catalog. Due to the required physical proximity, the risk to large populations is limited, but any compromised device could expose sensitive data to an attacker in the same physical environment.

Generated by OpenCVE AI on April 18, 2026 at 02:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Beetel 777VR1 firmware to a version newer than 01.00.09/01.00.09_55 or to a version that includes the vendor’s fix once it becomes available.
  • Disable the UART interface when it is not needed, or restrict its use through proper authentication and authorization controls.
  • Implement physical security controls for the device and apply network segmentation so that only authorized personnel can reach devices that retain UART functionality.

Generated by OpenCVE AI on April 18, 2026 at 02:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Beetel 777vr1 Firmware
CPEs cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Beetel 777vr1 Firmware

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Beetel
Beetel 777vr1
Vendors & Products Beetel
Beetel 777vr1

Sun, 25 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Beetel 777VR1 up to 01.00.09/01.00.09_55. This affects an unknown part of the component UART Interface. Performing a manipulation results in information disclosure. The attack may be carried out on the physical device. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Beetel 777VR1 UART information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 1.2, 'vector': 'AV:L/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2, 'vector': 'CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 1, 'vector': 'CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Beetel 777vr1 777vr1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:54:00.793Z

Reserved: 2026-01-25T09:43:00.571Z

Link: CVE-2026-1407

cve-icon Vulnrichment

Updated: 2026-01-26T15:45:09.612Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-25T22:16:00.563

Modified: 2026-01-30T20:34:56.397

Link: CVE-2026-1407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses