CVE-2026-2702
Hardcoded Credentials in Beetel 777VR1 WPA2 PSK Component
Publication date: 2026-02-19
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| beetel | 777vr1 | to 01.00.09 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-259 | The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components. |
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a security flaw found in the Beetel 777VR1 device up to version 01.00.09. It involves an issue with the WPA2 PSK component where certain unknown processing leads to the use of hard-coded credentials. To exploit this vulnerability, an attacker must have access to the local network. The attack is considered difficult to perform, but the exploit code has been made publicly available.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with local network access to use hard-coded credentials to potentially gain unauthorized access to the affected device. However, the attack complexity is high and exploitability is difficult, which may limit the likelihood of successful attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know