CVE-2026-2616
Beetel 777VR1 Web Management hard-coded credentials
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is advisable to modify the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way.
| CWE | CWE-798 CWE-259 |
| Vendor | beetel |
| Product | 777vr1 |
| Published | Feb 17, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for beetel 777vr1
Be the first to know when new high vulnerabilities affecting beetel 777vr1 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Beetel / 777VR1
01.00.09
References
vuldb.com: https://vuldb.com/?id.346266 vuldb.com: https://vuldb.com/?ctiid.346266 vuldb.com: https://vuldb.com/?submit.751314 gist.github.com: https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc gist.github.com: https://gist.github.com/raghav20232023/d8dcaaa76e71790f77f8d3ea714d2afc#reproduction-steps
Credits
๐ raghav_2026 (VulDB User)