Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
Beetel 777VR1 Telnet/SSH Service Not Securely Configured
CVE-2026-2617
Summary
The Telnet and SSH services on Beetel 777VR1 devices are not properly configured, which means they may not be secure by default. This could allow an attacker on the same local network to exploit this weakness. We recommend checking your device's configuration and updating to a secure version if possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| beetel | 777vr1_firmware | <= 01.00.09_55 | – |
Original title
A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization ...
Original description
A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
nvd CVSS2.0
5.8
nvd CVSS3.1
8.8
nvd CVSS4.0
5.3
Vulnerability type
CWE-1188
- https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0 Exploit Third Party Advisory
- https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofste... Exploit Third Party Advisory
- https://vuldb.com/?ctiid.346267 VDB Entry Permissions Required
- https://vuldb.com/?id.346267 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.751436 Third Party Advisory VDB Entry Exploit
- https://vuldb.com/?submit.751568 Third Party Advisory VDB Entry Exploit
Published: 17 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026