CVE-2026-9141
Authentication Bypass in Taiko AG1000-01A SMS Alert Gateway
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| taiko | ag1000-01a | 7.3 |
| taiko | ag1000-01a | 8 |
| taiko | ag1000-01a | um-ag1000_r7.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-9141 is a critical authentication bypass vulnerability in the Taiko AG1000-01A SMS Alert Gateway, specifically in versions Rev 7.3, Rev 8, and UM-AG1000_R7.2. The vulnerability exists in the embedded web configuration interface, where unauthenticated attackers can bypass authentication and access internal application pages without any session management or server-side authentication checks.
Attackers with network access can directly request internal resources such as index.zhtml, point.zhtml, and log.shtml, which grants them full administrative read and write access. This allows unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows attackers to gain full administrative access to the device without authentication. They can modify alarm routing and device configurations, potentially disrupting monitoring and control functions.
Such unauthorized access and modifications can lead to failure in alerting critical events, misconfiguration of the device, and overall compromise of the security and reliability of the monitoring system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the internal application pages of the Taiko AG1000-01A SMS Alert Gateway without authentication. Specifically, you can try to directly request the following URLs on the device's web interface: index.zhtml, point.zhtml, and log.shtml.
If these pages are accessible without any authentication or session management, it indicates the presence of the authentication bypass vulnerability.
Suggested commands to test this from a network perspective include using tools like curl or wget to request these pages:
- curl -I http://<device-ip>/index.zhtml
- curl -I http://<device-ip>/point.zhtml
- curl -I http://<device-ip>/log.shtml
If the HTTP response status is 200 OK and the content indicates access to administrative pages without authentication, the vulnerability is present.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting network access to the Taiko AG1000-01A SMS Alert Gateway's web interface to trusted administrators only.
Implement network-level controls such as firewall rules or VLAN segmentation to prevent unauthorized users from reaching the device's web interface.
Additionally, monitor and audit access logs for any unauthorized attempts to access the internal pages like index.zhtml, point.zhtml, and log.shtml.
Contact the vendor or check for firmware updates or patches that address this authentication bypass vulnerability and apply them as soon as they become available.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to gain full administrative access to the Taiko AG1000-01A SMS Alert Gateway, enabling unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.
Such unauthorized access and potential manipulation of security and monitoring functions could lead to violations of compliance requirements under common standards and regulations like GDPR and HIPAA, which mandate strict controls over access to sensitive systems and data, as well as ensuring the integrity and availability of security monitoring.
Therefore, exploitation of this vulnerability could compromise the confidentiality, integrity, and availability of systems monitored by the device, potentially resulting in non-compliance with these regulations.