CVE-2026-2616

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is advisable to modify the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc Exploit Third Party Advisory
https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc#reproduction-steps Exploit Third Party Advisory
https://vuldb.com/?ctiid.346266 VDB Entry Permissions Required
https://vuldb.com/?id.346266 Third Party Advisory VDB Entry
https://vuldb.com/?submit.751314 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-17 15:16

Updated : 2026-02-19 19:56


NVD link : CVE-2026-2616

Mitre link : CVE-2026-2616

CVE.ORG link : CVE-2026-2616


JSON object : View

Products Affected

beetel

  • 777vr1
  • 777vr1_firmware
CWE
CWE-259

Use of Hard-coded Password

CWE-798

Use of Hard-coded Credentials