Impact
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in its embedded web configuration interface. The flaw allows attackers who can reach the device over the network to request internal resources such as index.zhtml, point.zhtml, and log.shtml without any session management or server‑side authentication checks. By exploiting this, an attacker can read and modify alarm routing, device configuration, and other monitoring and control functions, effectively gaining full administrative control over the gateway.
Affected Systems
The vulnerability affects Taiko Network Communications’ AG1000‑01A SMS Alert Gateway, specifically the Rev 7.3 and Rev 8 firmware releases. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 9.3 indicates a high severity vulnerability. EPSS data is not available, but the lack of a mitigation paragraph in the description suggests that network access to the web interface is required. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by connecting to the device’s web interface over the local network and directly requesting internal pages, which will be served without authentication. The impact is full administrative privileges.
OpenCVE Enrichment