Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-9141: CWE-306 Missing Authentication for Critical Function in Taiko Network Communications Pte Ltd. AG1000-01A SMS Alert Gateway

0
Critical
VulnerabilityCVE-2026-9141cvecve-2026-9141cwe-306
Published: Wed May 20 2026 (05/20/2026, 19:52:40 UTC)
Source: CVE Database V5
Vendor/Project: Taiko Network Communications Pte Ltd.
Product: AG1000-01A SMS Alert Gateway

Description

CVE-2026-9141 is a critical authentication bypass vulnerability in the Taiko AG1000-01A SMS Alert Gateway versions Rev 7. 3, Rev 8, and UM-AG1000_R7. 2. The embedded web configuration interface lacks proper session management and server-side authentication checks, allowing unauthenticated attackers with network access to reach internal application pages. This enables full administrative read and write access, permitting unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/20/2026, 20:33:38 UTC

Technical Analysis

The Taiko AG1000-01A SMS Alert Gateway contains a missing authentication vulnerability (CWE-306) in its embedded web configuration interface. Specifically, versions Rev 7.3, Rev 8, and UM-AG1000_R7.2 allow unauthenticated network attackers to directly request internal resources such as index.zhtml, point.zhtml, and log.shtml without any session or authentication checks. This flaw grants attackers full administrative access to the device's configuration and monitoring controls, posing a critical security risk. The vulnerability has a CVSS v3.1 score of 9.8, indicating high impact on confidentiality, integrity, and availability. No official patch or remediation guidance is currently available from the vendor, and no known exploits in the wild have been reported as of the publication date.

Potential Impact

Successful exploitation allows unauthenticated attackers to gain full administrative access to the SMS Alert Gateway, enabling unauthorized reading and modification of alarm routing and device configuration. This can disrupt monitoring and control functions critical to the device's operation, potentially causing denial of service or manipulation of alerting mechanisms. The vulnerability affects confidentiality, integrity, and availability at a critical level.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict network access to the device's web interface to trusted administrators only. Employ network-level controls such as firewalls or VPNs to limit exposure. Monitor for any unusual access attempts to the device. Avoid exposing the device's management interface to untrusted networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-05-20T19:42:57.673Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 6a0e173eba1db47362a37eb9

Added to database: 5/20/2026, 8:19:10 PM

Last enriched: 5/20/2026, 8:33:38 PM

Last updated: 5/20/2026, 9:25:47 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses