Impact
The vulnerability is a weakness in the UART interface of Beetel 777VR1, which allows an attacker to exploit weak password requirements. When manipulated, the UART component accepts an insufficiently strong password, enabling unauthorized local access. This weakness is classified as CWE‑521 and can potentially allow an attacker to gain control of the device, leading to confidentiality or integrity loss, depending on what commands are accepted over the UART link.
Affected Systems
The affected system is the Beetel 777VR1 hardware device running firmware versions up through 01.00.09/01.00.09_55. The issue resides in the UART interface component of this firmware.
Risk and Exploitability
This flaw has a CVSS score of 1, indicating a very low severity, and an EPSS score of less than 1%, meaning it is unlikely to be widely exploited. The exploitation vector is physical, targeting the UART port of the device, and requires high complexity, so existing public exploits are likely difficult to deploy. Because it is not listed in the CISA KEV catalog, it is not a known, actively exploited vulnerability, but the weakness still permits unauthorized local access if the attacker gains physical access.
OpenCVE Enrichment