Impact
The Beetel 777VR1 firmware contains a flaw that fails to properly restrict the number of authentication attempts made through the UART interface. This weakness is classified as CWE‑307 and CWE‑799 and could allow an attacker who can physically access the UART port to repeatedly attempt login credentials, potentially bypassing authentication after a sufficient number of attempts or allowing brute‑force attacks. The description explicitly states that the exploitability is difficult but the attack can be launched on the physical device, indicating that the immediate risk hinges on physical proximity to the hardware.
Affected Systems
Affected products are the Beetel 777VR1 units whose firmware versions up to 01.00.09/01.00.09_55 are vulnerable. No other Beetel devices or firmware versions are mentioned as impacted, so the vulnerability is limited to these firmware releases on the 777VR1 model.
Risk and Exploitability
The CVSS score is a 1, punctuating the low severity of the flaw, and the EPSS score is below 1%, suggesting that exploitation attempts are unlikely and the discovery is unlikely to be automated. The KEV catalog marks it as not listed, confirming it is not a known, actively exploited vulnerability. However, the flaw remains a potential vector for attackers with physical access, and given the high attack complexity described, mitigation should not be neglected.
OpenCVE Enrichment