{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1408","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-25T09:43:06.267Z","datePublished":"2026-01-25T23:02:06.097Z","dateUpdated":"2026-02-23T08:54:12.409Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:54:12.409Z"},"title":"Beetel 777VR1 UART weak password","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-521","lang":"en","description":"Weak Password Requirements"}]}],"affected":[{"vendor":"Beetel","product":"777VR1","versions":[{"version":"01.00.09","status":"affected"},{"version":"01.00.09_55","status":"affected"}],"modules":["UART Interface"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Beetel 777VR1 up to 01.00.09/01.00.09_55. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements. The physical device can be targeted for the attack. The attack requires a high level of complexity. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":1,"vectorString":"CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":2,"vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2,"vectorString":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.2,"vectorString":"AV:L/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-25T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-31T07:44:08.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"raghav_2026 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.342797","name":"VDB-342797 | Beetel 777VR1 UART weak password","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.342797","name":"VDB-342797 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.739384","name":"Submit #739384 | Beetel Beetel 777VR1 Broadband Router Firmware Version: V01.00.09 / V01.00.09_55 CWE-521 — Weak Password Requirements","tags":["third-party-advisory"]},{"url":"https://gist.github.com/raghav20232023/9c51cbd91f3798b1c10f3f30fb631633","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-26T17:30:22.294742Z","id":"CVE-2026-1408","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-26T17:30:28.524Z"}}]}}