{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1411","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-25T09:43:14.850Z","datePublished":"2026-01-26T00:32:06.281Z","dateUpdated":"2026-02-23T08:54:50.445Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:54:50.445Z"},"title":"Beetel 777VR1 UART access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"Beetel","product":"777VR1","versions":[{"version":"01.00.09","status":"affected"},{"version":"01.00.09_55","status":"affected"}],"modules":["UART Interface"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Beetel 777VR1 up to 01.00.09/01.00.09_55. The affected element is an unknown function of the component UART Interface. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The complexity of an attack is rather high. The exploitability is described as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.4,"vectorString":"CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.1,"vectorString":"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.1,"vectorString":"CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.9,"vectorString":"AV:L/AC:H/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-25T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-27T21:58:10.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"raghav_2026 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.342800","name":"VDB-342800 | Beetel 777VR1 UART access control","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.342800","name":"VDB-342800 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.740674","name":"Submit #740674 | Beetel Beetel 777VR1 Broadband Router Firmware Versions: V01.00.09 / V01.00.09_55      CWE-284 — Improper Access Control","tags":["third-party-advisory"]},{"url":"https://gist.github.com/raghav20232023/ea6adcd6d1eca35683570a1094164bd3","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-26T17:28:56.623407Z","id":"CVE-2026-1411","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-26T17:29:02.637Z"}}]}}