Impact
The flaw lies in the WPA2 PSK component of the Beetel 777VR1, allowing a local network adversary to trigger a manipulation that reveals hard‑coded credentials. With these credentials the attacker can authenticate as a privileged user and gain full control of the device, potentially altering configuration or intercepting traffic. The weakness is a credential management flaw that exposes default secrets.
Affected Systems
The vulnerability affects the Beetel 777VR1 device running firmware versions up to 01.00.09. No further vendor or product details are provided in the CVE entry.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, and the EPSS score is below 1 %. The vulnerability is not listed in the KEV catalog. The exploit requires local network access and is described as complex and difficult; however, the exploit code has been released publicly. If leveraged, it could provide an attacker with persistent device access and open the door to deeper network compromise.
OpenCVE Enrichment