CVE-2026-2618

A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. This manipulation causes risky cryptographic algorithm. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/raghav20232023/8e8e559f80e2d596cb6154747f69a081 Exploit Third Party Advisory Mitigation
https://gist.github.com/raghav20232023/8e8e559f80e2d596cb6154747f69a081#proof--steps-to-reproduce Exploit Third Party Advisory
https://vuldb.com/?ctiid.346268 VDB Entry Permissions Required
https://vuldb.com/?id.346268 Third Party Advisory VDB Entry
https://vuldb.com/?submit.751633 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-17 17:21

Updated : 2026-02-19 17:32


NVD link : CVE-2026-2618

Mitre link : CVE-2026-2618

CVE.ORG link : CVE-2026-2618


JSON object : View

Products Affected

beetel

  • 777vr1
  • 777vr1_firmware
CWE
CWE-310

Cryptographic Issues

CWE-327

Use of a Broken or Risky Cryptographic Algorithm