CVE-2026-1410
BaseFortify
Publication date: 2026-01-26
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| beetel | 777vr1_firmware | to 01.00.09_55 (inc) |
| beetel | 777vr1 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-1410 is a vulnerability in the Beetel 777VR1 broadband router's UART interface, specifically in the Realtek RTL8685S bootloader. The bootloader exposes an interactive console accessible via the UART serial interface during early device startup. An attacker with physical access can interrupt the boot process by pressing the ESC key, gaining immediate access to this console. Critically, this console lacks any authentication, authorization, or access control, allowing unrestricted pre-operating system control over the device. This means the attacker can bypass all OS-level security protections and fully compromise the device before the operating system loads. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability allows an attacker with physical access to the device to gain full control over the Beetel 777VR1 router before the operating system loads. This can lead to a complete compromise of system integrity and trust boundaries, bypassing all OS-level security controls. The attacker can manipulate the device, potentially intercepting or altering network traffic, disrupting availability, or stealing sensitive information. Because the exploit requires physical access and is complex, the risk is somewhat limited, but the impact on confidentiality, integrity, and availability of the device is severe. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by physically accessing the Beetel 777VR1 device and connecting to its UART serial interface. During the device's early boot process, pressing the ESC key interrupts the boot sequence and grants access to an interactive bootloader console that lacks authentication. Detection involves verifying if this console is accessible without authentication. Specific commands would involve using a serial communication tool (e.g., minicom, screen, PuTTY) to connect to the UART interface and attempting to interrupt the boot process by sending an ESC character. For example, using a command like 'screen /dev/ttyUSB0 115200' (assuming the UART interface is connected via USB serial adapter) and pressing ESC during boot to check for console access. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Restricting physical access to the device to prevent attackers from accessing the UART interface. 2) Disabling or removing the interactive bootloader console in production firmware if possible. 3) Implementing authentication mechanisms before granting access to the bootloader console. 4) Enforcing secure boot with signed firmware verification to prevent unauthorized bootloader access. 5) Removing or restricting the ability to interrupt the boot process (e.g., disabling the ESC key interrupt). If these firmware changes are not possible, consider replacing the affected device with a more secure alternative. [1, 2, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not contain information regarding the impact of CVE-2026-1410 on compliance with common standards and regulations such as GDPR or HIPAA.