Impact
The vulnerability in Beetel 777VR1 firmware before 01.00.09 uses a weak cryptographic algorithm in its SSH service. Attackers can manipulate the component to force the use of a risky encryption routine, potentially allowing interception or tampering of SSH traffic.
Affected Systems
Affected devices are the Beetel 777VR1 series. The CVE notes that all firmware versions up to 01.00.09 contain the issue. No later firmware version is explicitly listed in the input, so users should verify current firmware differs from those versions.
Risk and Exploitability
The CVSS score of 6.3 reflects a medium severity, and the EPSS score of less than 1% indicates a low likelihood of real-world exploitation at present. However, the vulnerability is publicly disclosed and the vendor did not respond to the notification, increasing risk. The attack requires remote access to the SSH service, can be performed with medium to high complexity, and is considered difficult to execute but not impossible.
OpenCVE Enrichment