{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1409","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-25T09:43:09.352Z","datePublished":"2026-01-25T23:32:06.715Z","dateUpdated":"2026-02-23T08:54:25.875Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:54:25.875Z"},"title":"Beetel 777VR1 UART excessive authentication","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-307","lang":"en","description":"Improper Restriction of Excessive Authentication Attempts"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-799","lang":"en","description":"Improper Control of Interaction Frequency"}]}],"affected":[{"vendor":"Beetel","product":"777VR1","versions":[{"version":"01.00.09","status":"affected"},{"version":"01.00.09_55","status":"affected"}],"modules":["UART Interface"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack on the physical device. The attack's complexity is rated as high. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":1,"vectorString":"CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":2,"vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2,"vectorString":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.2,"vectorString":"AV:L/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-25T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-31T07:44:08.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"raghav_2026 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.342798","name":"VDB-342798 | Beetel 777VR1 UART excessive authentication","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.342798","name":"VDB-342798 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.739399","name":"Submit #739399 | Beetel Beetel 777VR1 Broadband Router Firmware Version: V01.00.09 / V01.00.09_55 CWE-307 Improper Restriction - Excessive Authentication Attempts","tags":["third-party-advisory"]},{"url":"https://gist.github.com/raghav20232023/19900b427445adf37f64ae953611bfce","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-26T17:29:53.210725Z","id":"CVE-2026-1409","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-26T17:29:59.180Z"}}]}}