Description
A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. This manipulation causes risky cryptographic algorithm. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-17
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Weak cipher algorithms may lead to data exposure
Action: Immediate Update
AI Analysis

Impact

The vulnerability in Beetel 777VR1 firmware before 01.00.09 uses a weak cryptographic algorithm in its SSH service. Attackers can manipulate the component to force the use of a risky encryption routine, potentially allowing interception or tampering of SSH traffic.

Affected Systems

Affected devices are the Beetel 777VR1 series. The CVE notes that all firmware versions up to 01.00.09 contain the issue. No later firmware version is explicitly listed in the input, so users should verify current firmware differs from those versions.

Risk and Exploitability

The CVSS score of 6.3 reflects a medium severity, and the EPSS score of less than 1% indicates a low likelihood of real-world exploitation at present. However, the vulnerability is publicly disclosed and the vendor did not respond to the notification, increasing risk. The attack requires remote access to the SSH service, can be performed with medium to high complexity, and is considered difficult to execute but not impossible.

Generated by OpenCVE AI on April 17, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Beetel 777VR1 firmware to the latest version that removes the weak encryption in the SSH service.
  • If an upgrade is not immediately possible, disable or block weak cipher suites in the SSH configuration or, if not configurable, block SSH access from untrusted networks.
  • Limit SSH connectivity to known administrative IP addresses using firewall rules.
  • Continuously monitor SSH logs for anomalous activity and verify that restricted access is enforced.

Generated by OpenCVE AI on April 17, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Beetel 777vr1 Firmware
CPEs cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Beetel 777vr1 Firmware

Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Beetel
Beetel 777vr1
Vendors & Products Beetel
Beetel 777vr1

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. This manipulation causes risky cryptographic algorithm. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Beetel 777VR1 SSH Service risky encryption
Weaknesses CWE-310
CWE-327
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Beetel 777vr1 777vr1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:14:00.459Z

Reserved: 2026-02-17T07:00:52.965Z

Link: CVE-2026-2618

cve-icon Vulnrichment

Updated: 2026-02-17T17:14:52.596Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-17T17:21:06.490

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:00:11Z

Weaknesses