Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2702: Hard-coded Credentials in Beetel 777VR1

0
Low
VulnerabilityCVE-2026-2702cvecve-2026-2702
Published: Thu Feb 19 2026 (02/19/2026, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Beetel
Product: 777VR1

Description

A security flaw has been discovered in Beetel 777VR1 up to 01.00.09. This issue affects some unknown processing of the component WPA2 PSK. Performing a manipulation results in hard-coded credentials. The attacker must have access to the local network to execute the attack. The complexity of an attack is rather high. The exploitability is assessed as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:05:42 UTC

Technical Analysis

CVE-2026-2702 describes a security vulnerability in the Beetel 777VR1 router firmware up to version 01.00.09. The flaw arises from hard-coded credentials embedded within the device's WPA2 PSK processing component. Hard-coded credentials are static secrets embedded in firmware, which cannot be changed by the user, and if discovered, allow attackers to bypass authentication mechanisms. In this case, an attacker with access to the local network can exploit this vulnerability to gain unauthorized access to the device or network. The attack complexity is rated as high, indicating that exploitation requires significant effort or specialized knowledge, and the exploitability is difficult. No authentication or user interaction is required, but the attacker must be on the local network, limiting remote exploitation. The CVSS 4.0 base score is 2.3, reflecting low severity primarily due to the limited attack vector and difficulty. The vendor was notified early but did not respond or provide patches. The vulnerability could allow attackers to compromise network confidentiality by leveraging the hard-coded credentials to access or manipulate network traffic or device settings. No known exploits in the wild have been reported yet, but a public exploit is available, increasing the risk of future attacks.

Potential Impact

The primary impact of CVE-2026-2702 is unauthorized access to the local network through exploitation of hard-coded WPA2 PSK credentials. This can lead to confidentiality breaches, allowing attackers to intercept or manipulate network traffic, potentially compromising sensitive data. Integrity and availability impacts are less likely given the nature of the vulnerability and the difficulty of exploitation. However, if exploited, attackers could potentially alter device configurations or launch further attacks within the network. Organizations relying on Beetel 777VR1 routers in sensitive environments may face increased risk of lateral movement by attackers once inside the local network. The limited attack vector (local network access required) reduces the scope but does not eliminate risk, especially in environments with weak internal network segmentation or guest access controls. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation.

Mitigation Recommendations

Organizations should immediately assess their deployment of Beetel 777VR1 devices and verify firmware versions. Since no patches are currently available, network-level mitigations are critical. These include: 1) Restricting physical and wireless access to trusted users only, ensuring strong network access controls and segmentation to isolate vulnerable devices from untrusted users or guest networks. 2) Monitoring network traffic for unusual authentication attempts or connections involving the affected devices. 3) Disabling or limiting WPA2 PSK usage if possible, or replacing affected devices with models from vendors that provide timely security updates. 4) Employing network intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. 5) Regularly auditing device configurations and network access logs to identify suspicious activity. 6) Engaging with the vendor or community for updates or unofficial patches. 7) Considering alternative secure authentication mechanisms such as WPA3 where supported. These steps help reduce the risk until an official patch or firmware update is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T17:56:10.604Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69968d666aea4a407a390160

Added to database: 2/19/2026, 4:11:18 AM

Last enriched: 2/28/2026, 1:05:42 PM

Last updated: 4/9/2026, 8:32:26 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses