CVE-2026-9139
Hard-Coded Credentials in Taiko AG1000-01A SMS Alert Gateway
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| taiko_network_communications | ag1000-01a | 7.3 |
| taiko_network_communications | ag1000-01a | 8 |
| taiko_network_communications | ag1000-01a | um-ag1000_r7.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Taiko AG1000-01A SMS Alert Gateway exposes hard-coded administrative credentials in client-side JavaScript, allowing unauthenticated attackers to gain full administrative access. This unauthorized access can lead to configuration changes, network disruption, and account takeover.
Such unauthorized access and potential data manipulation pose significant risks to the confidentiality, integrity, and availability of data managed by the device. This can impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over access to sensitive data and systems.
Because the device is used in industrial environments and lacks vendor support or patches, organizations must isolate it from untrusted networks and restrict access to mitigate risks and maintain compliance.
Can you explain this vulnerability to me?
The vulnerability in Taiko AG1000-01A SMS Alert Gateway versions Rev 7.3 and Rev 8 is due to hard-coded administrative credentials embedded in the client-side JavaScript of the web configuration interface, specifically in the login.zhtml file.
Because authentication is implemented entirely on the client side, the static plaintext credentials are exposed in the page source, allowing unauthenticated attackers with network access to extract these credentials from the validate() function.
This exposure grants attackers full administrative access to the device without needing to authenticate.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to gain full administrative access to the Taiko AG1000-01A device.
- Attackers can extract plaintext administrative credentials and take over the device.
- They can make unauthorized configuration changes.
- They can disrupt network operations.
- They can access sensitive internal pages without authentication due to additional authentication bypass vulnerabilities.
- Attackers may also exploit stored cross-site scripting (XSS) vulnerabilities to inject malicious scripts, potentially manipulating the device or redirecting operators to malicious sites.
Since the vendor is inactive and no patches are available, affected organizations must isolate the device from untrusted networks and restrict access to mitigate these risks.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by accessing the embedded web configuration interface of the Taiko AG1000-01A SMS Alert Gateway and inspecting the login.zhtml page source. Since the authentication is implemented entirely in client-side JavaScript, the static plaintext administrative credentials are exposed in the validate() function within the page source.
To detect the vulnerability on your network or system, you can use tools like curl or wget to retrieve the login.zhtml page and then search for the presence of hardcoded credentials in the JavaScript code.
- curl http://<device-ip>/login.zhtml -o login.zhtml
- grep -i 'validate' login.zhtml
- grep -E 'username|password|credential' login.zhtml
If the validate() function or any static plaintext credentials are found in the page source, the device is vulnerable.
What immediate steps should I take to mitigate this vulnerability?
Since the vendor Taiko Network Communications Pte Ltd is inactive and no patches are available for this vulnerability, immediate mitigation steps focus on network and access controls.
- Isolate the Taiko AG1000-01A device from untrusted networks to prevent unauthorized access.
- Restrict access to the device using VLAN segmentation or VPNs to limit exposure.
- Block direct internet exposure of the device to reduce the attack surface.
These measures help mitigate the risk of exploitation by limiting network access to trusted users only.