Description
A security vulnerability has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack on the physical device. The attack's complexity is rated as high. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-25
Score: 1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Excessive Authentication Attempts
Action: Patch
AI Analysis

Impact

The Beetel 777VR1 firmware contains a flaw that fails to properly restrict the number of authentication attempts made through the UART interface. This weakness is classified as CWE‑307 and CWE‑799 and could allow an attacker who can physically access the UART port to repeatedly attempt login credentials, potentially bypassing authentication after a sufficient number of attempts or allowing brute‑force attacks. The description explicitly states that the exploitability is difficult but the attack can be launched on the physical device, indicating that the immediate risk hinges on physical proximity to the hardware.

Affected Systems

Affected products are the Beetel 777VR1 units whose firmware versions up to 01.00.09/01.00.09_55 are vulnerable. No other Beetel devices or firmware versions are mentioned as impacted, so the vulnerability is limited to these firmware releases on the 777VR1 model.

Risk and Exploitability

The CVSS score is a 1, punctuating the low severity of the flaw, and the EPSS score is below 1%, suggesting that exploitation attempts are unlikely and the discovery is unlikely to be automated. The KEV catalog marks it as not listed, confirming it is not a known, actively exploited vulnerability. However, the flaw remains a potential vector for attackers with physical access, and given the high attack complexity described, mitigation should not be neglected.

Generated by OpenCVE AI on April 18, 2026 at 02:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the 777VR1 firmware to a version newer than 01.00.09/01.00.09_55 where the UART authentication limit has been corrected.
  • Disable or lock down the UART interface if it is not required for operational use, removing the vulnerable conduit.
  • Configure the device to enforce authentication throttling or lockouts on all local interfaces to prevent repeated credential attempts, even if UART remains active.

Generated by OpenCVE AI on April 18, 2026 at 02:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Beetel 777vr1 Firmware
CPEs cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Beetel 777vr1 Firmware

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Beetel
Beetel 777vr1
Vendors & Products Beetel
Beetel 777vr1

Sun, 25 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack on the physical device. The attack's complexity is rated as high. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Beetel 777VR1 UART excessive authentication
Weaknesses CWE-307
CWE-799
References
Metrics cvssV2_0

{'score': 1.2, 'vector': 'AV:L/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2, 'vector': 'CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 1, 'vector': 'CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Beetel 777vr1 777vr1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:54:25.875Z

Reserved: 2026-01-25T09:43:09.352Z

Link: CVE-2026-1409

cve-icon Vulnrichment

Updated: 2026-01-26T17:29:56.587Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T00:16:03.050

Modified: 2026-01-30T20:27:24.987

Link: CVE-2026-1409

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses