CVE-2026-9141
Received Received - Intake
Authentication Bypass in Taiko AG1000-01A SMS Alert Gateway

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: VulnCheck

Description
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session management or server-side authentication checks. Attackers with network access can directly request internal resources such as index.zhtml, point.zhtml, and log.shtml to gain full administrative read and write access, enabling unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-21
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
taiko ag1000-01a 7.3
taiko ag1000-01a 8
taiko ag1000-01a um-ag1000_r7.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-9141 is a critical authentication bypass vulnerability in the Taiko AG1000-01A SMS Alert Gateway, specifically in versions Rev 7.3, Rev 8, and UM-AG1000_R7.2. The vulnerability exists in the embedded web configuration interface, where unauthenticated attackers can bypass authentication and access internal application pages without any session management or server-side authentication checks.

Attackers with network access can directly request internal resources such as index.zhtml, point.zhtml, and log.shtml, which grants them full administrative read and write access. This allows unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to gain full administrative access to the device without authentication. They can modify alarm routing and device configurations, potentially disrupting monitoring and control functions.

Such unauthorized access and modifications can lead to failure in alerting critical events, misconfiguration of the device, and overall compromise of the security and reliability of the monitoring system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access the internal application pages of the Taiko AG1000-01A SMS Alert Gateway without authentication. Specifically, you can try to directly request the following URLs on the device's web interface: index.zhtml, point.zhtml, and log.shtml.

If these pages are accessible without any authentication or session management, it indicates the presence of the authentication bypass vulnerability.

Suggested commands to test this from a network perspective include using tools like curl or wget to request these pages:

  • curl -I http://<device-ip>/index.zhtml
  • curl -I http://<device-ip>/point.zhtml
  • curl -I http://<device-ip>/log.shtml

If the HTTP response status is 200 OK and the content indicates access to administrative pages without authentication, the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network access to the Taiko AG1000-01A SMS Alert Gateway's web interface to trusted administrators only.

Implement network-level controls such as firewall rules or VLAN segmentation to prevent unauthorized users from reaching the device's web interface.

Additionally, monitor and audit access logs for any unauthorized attempts to access the internal pages like index.zhtml, point.zhtml, and log.shtml.

Contact the vendor or check for firmware updates or patches that address this authentication bypass vulnerability and apply them as soon as they become available.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to gain full administrative access to the Taiko AG1000-01A SMS Alert Gateway, enabling unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.

Such unauthorized access and potential manipulation of security and monitoring functions could lead to violations of compliance requirements under common standards and regulations like GDPR and HIPAA, which mandate strict controls over access to sensitive systems and data, as well as ensuring the integrity and availability of security monitoring.

Therefore, exploitation of this vulnerability could compromise the confidentiality, integrity, and availability of systems monitored by the device, potentially resulting in non-compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart