CVE-2026-9139
Received Received - Intake
Hard-Coded Credentials in Taiko AG1000-01A SMS Alert Gateway

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: VulnCheck

Description
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability in the embedded web configuration interface where authentication is implemented entirely in client-side JavaScript in login.zhtml, exposing static plaintext credentials in the page source. Unauthenticated attackers with network access can recover administrative credentials directly from the client-side validate() function to obtain full administrative access to the device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-21
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
taiko_network_communications ag1000-01a 7.3
taiko_network_communications ag1000-01a 8
taiko_network_communications ag1000-01a um-ag1000_r7.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Taiko AG1000-01A SMS Alert Gateway exposes hard-coded administrative credentials in client-side JavaScript, allowing unauthenticated attackers to gain full administrative access. This unauthorized access can lead to configuration changes, network disruption, and account takeover.

Such unauthorized access and potential data manipulation pose significant risks to the confidentiality, integrity, and availability of data managed by the device. This can impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over access to sensitive data and systems.

Because the device is used in industrial environments and lacks vendor support or patches, organizations must isolate it from untrusted networks and restrict access to mitigate risks and maintain compliance.


Can you explain this vulnerability to me?

The vulnerability in Taiko AG1000-01A SMS Alert Gateway versions Rev 7.3 and Rev 8 is due to hard-coded administrative credentials embedded in the client-side JavaScript of the web configuration interface, specifically in the login.zhtml file.

Because authentication is implemented entirely on the client side, the static plaintext credentials are exposed in the page source, allowing unauthenticated attackers with network access to extract these credentials from the validate() function.

This exposure grants attackers full administrative access to the device without needing to authenticate.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated attackers to gain full administrative access to the Taiko AG1000-01A device.

  • Attackers can extract plaintext administrative credentials and take over the device.
  • They can make unauthorized configuration changes.
  • They can disrupt network operations.
  • They can access sensitive internal pages without authentication due to additional authentication bypass vulnerabilities.
  • Attackers may also exploit stored cross-site scripting (XSS) vulnerabilities to inject malicious scripts, potentially manipulating the device or redirecting operators to malicious sites.

Since the vendor is inactive and no patches are available, affected organizations must isolate the device from untrusted networks and restrict access to mitigate these risks.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by accessing the embedded web configuration interface of the Taiko AG1000-01A SMS Alert Gateway and inspecting the login.zhtml page source. Since the authentication is implemented entirely in client-side JavaScript, the static plaintext administrative credentials are exposed in the validate() function within the page source.

To detect the vulnerability on your network or system, you can use tools like curl or wget to retrieve the login.zhtml page and then search for the presence of hardcoded credentials in the JavaScript code.

  • curl http://<device-ip>/login.zhtml -o login.zhtml
  • grep -i 'validate' login.zhtml
  • grep -E 'username|password|credential' login.zhtml

If the validate() function or any static plaintext credentials are found in the page source, the device is vulnerable.


What immediate steps should I take to mitigate this vulnerability?

Since the vendor Taiko Network Communications Pte Ltd is inactive and no patches are available for this vulnerability, immediate mitigation steps focus on network and access controls.

  • Isolate the Taiko AG1000-01A device from untrusted networks to prevent unauthorized access.
  • Restrict access to the device using VLAN segmentation or VPNs to limit exposure.
  • Block direct internet exposure of the device to reduce the attack surface.

These measures help mitigate the risk of exploitation by limiting network access to trusted users only.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart