Impact
This vulnerability in Beetel 777VR1, affecting firmware versions up to 01.00.09, arises from an insecure default initialization of a resource within the Telnet/SSH service component. The flaw allows a local network actor to manipulate the behaviour of the service, potentially causing unauthorized actions or disruption, though the advisory does not detail specific outcomes. It is classified as CWE‑1188, indicating improper initialization during object construction.
Affected Systems
The impacted device is the Beetel 777VR1, with firmware versions up to 01.00.09. No other vendors or product variants are listed as affected in the current advisory.
Risk and Exploitability
The flaw can be exploited only from the local network; an attacker must be physically or logically connected to the same LAN segment to conduct the manipulation. The EPSS score of less than 1 % shows that real-world exploitation is unlikely, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, local attackers could use the flaw to alter Telnet or SSH service behaviour or possibly elevate access on the device.
OpenCVE Enrichment