{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2618","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-17T07:00:52.965Z","datePublished":"2026-02-17T16:32:06.477Z","dateUpdated":"2026-02-23T10:14:00.459Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:14:00.459Z"},"title":"Beetel 777VR1 SSH Service risky encryption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-327","lang":"en","description":"Risky Cryptographic Algorithm"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-310","lang":"en","description":"Cryptographic Issues"}]}],"affected":[{"vendor":"Beetel","product":"777VR1","versions":[{"version":"01.00.09","status":"affected"}],"modules":["SSH Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of the component SSH Service. This manipulation causes risky cryptographic algorithm. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR"}}],"timeline":[{"time":"2026-02-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-17T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-21T13:48:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"raghav_2026 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346268","name":"VDB-346268 | Beetel 777VR1 SSH Service risky encryption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346268","name":"VDB-346268 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.751633","name":"Submit #751633 | Beetel 777VR1 Firmware Versions: V01.00.09 / V01.00.09_55 Obsolete and Cryptographically Broken SSH Protocols CWE-327","tags":["third-party-advisory"]},{"url":"https://gist.github.com/raghav20232023/8e8e559f80e2d596cb6154747f69a081","tags":["related"]},{"url":"https://gist.github.com/raghav20232023/8e8e559f80e2d596cb6154747f69a081#proof--steps-to-reproduce","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-17T17:11:09.484848Z","id":"CVE-2026-2618","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-17T17:14:55.824Z"}}]}}