Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-2617

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-17 Feb, 2026 | 15:32
Updated At-17 Feb, 2026 | 15:46
Rejected At-
Credits

Beetel 777VR1 Telnet Service/SSH Service insecure default initialization of resource

A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:17 Feb, 2026 | 15:32
Updated At:17 Feb, 2026 | 15:46
Rejected At:
▼CVE Numbering Authority (CNA)
Beetel 777VR1 Telnet Service/SSH Service insecure default initialization of resource

A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected Products
Vendor
Beetel
Product
777VR1
Modules
  • Telnet Service/SSH Service
Versions
Affected
  • 01.00.09
Problem Types
TypeCWE IDDescription
CWECWE-1188Insecure Default Initialization of Resource
Type: CWE
CWE ID: CWE-1188
Description: Insecure Default Initialization of Resource
Metrics
VersionBase scoreBase severityVector
4.05.3MEDIUM
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3.06.3MEDIUM
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2.05.8N/A
AV:A/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Version: 3.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Version: 2.0
Base score: 5.8
Base severity: N/A
Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
raghav_2026 (VulDB User)
Timeline
EventDate
Advisory disclosed2026-02-17 00:00:00
VulDB entry created2026-02-17 01:00:00
VulDB entry last update2026-02-17 08:05:54
Event: Advisory disclosed
Date: 2026-02-17 00:00:00
Event: VulDB entry created
Date: 2026-02-17 01:00:00
Event: VulDB entry last update
Date: 2026-02-17 08:05:54
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.346267
vdb-entry
https://vuldb.com/?ctiid.346267
signature
permissions-required
https://vuldb.com/?submit.751436
third-party-advisory
https://vuldb.com/?submit.751568
third-party-advisory
https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0
related
https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproduce
exploit
Hyperlink: https://vuldb.com/?id.346267
Resource:
vdb-entry
Hyperlink: https://vuldb.com/?ctiid.346267
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.751436
Resource:
third-party-advisory
Hyperlink: https://vuldb.com/?submit.751568
Resource:
third-party-advisory
Hyperlink: https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0
Resource:
related
Hyperlink: https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproduce
Resource:
exploit
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:17 Feb, 2026 | 16:20
Updated At:19 Feb, 2026 | 19:51

A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.3MEDIUM
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Primary3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary2.05.8MEDIUM
AV:A/AC:L/Au:N/C:P/I:P/A:P
Type: Secondary
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

beetel
beetel
>>777vr1_firmware>>Versions up to 01.00.09_55(inclusive)
cpe:2.3:o:beetel:777vr1_firmware:*:*:*:*:*:*:*:*
beetel
beetel
>>777vr1>>-
cpe:2.3:h:beetel:777vr1:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1188Primarycna@vuldb.com
CWE ID: CWE-1188
Type: Primary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0cna@vuldb.com
Exploit
Third Party Advisory
https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproducecna@vuldb.com
Exploit
Third Party Advisory
https://vuldb.com/?ctiid.346267cna@vuldb.com
VDB Entry
Permissions Required
https://vuldb.com/?id.346267cna@vuldb.com
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.751436cna@vuldb.com
Third Party Advisory
VDB Entry
Exploit
https://vuldb.com/?submit.751568cna@vuldb.com
Third Party Advisory
VDB Entry
Exploit
Hyperlink: https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0
Source: cna@vuldb.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://gist.github.com/raghav20232023/39e3d88d1bc2bcef89bb0f3b5fbb73e0#proofsteps-to-reproduce
Source: cna@vuldb.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://vuldb.com/?ctiid.346267
Source: cna@vuldb.com
Resource:
VDB Entry
Permissions Required
Hyperlink: https://vuldb.com/?id.346267
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://vuldb.com/?submit.751436
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry
Exploit
Hyperlink: https://vuldb.com/?submit.751568
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry
Exploit

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2026-2616
Matching Score-8
Assigner-VulDB
ShareView Details
Matching Score-8
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.15% / 35.46%
||
7 Day CHG~0.00%
Published-17 Feb, 2026 | 15:02
Updated-19 Feb, 2026 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Beetel 777VR1 Web Management hard-coded credentials

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is advisable to modify the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-beetelBeetel
Product-777vr1_firmware777vr1777VR1
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2017-12736
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-0.15% / 35.46%
||
7 Day CHG~0.00%
Published-26 Dec, 2017 | 04:00
Updated-12 Aug, 2025 | 12:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the device under certain conditions. This could allow an attacker located in the adjacent network of the targeted device to perform unauthorized administrative actions.

Action-Not Available
Vendor-Siemens AG
Product-scalance_xr-500scalance_xr300-wg_firmwarescalance_xm-400_firmwarescalance_xc-200ruggedcomruggedcom_rsl910scalance_xb-200_firmwarescalance_xc-200_firmwarescalance_xr300-wgscalance_xr-500_firmwarescalance_xm-400scalance_xb-200ruggedcom_rosscalance_xp-200_firmwarescalance_xp-200RUGGEDCOM RS8000RUGGEDCOM RS900LRUGGEDCOM RSG2300 V4.XRUGGEDCOM RS900MNC-STND-XX-C01RUGGEDCOM RSG920P V4.XSCALANCE XB213-3 (ST, E/IP)RUGGEDCOM RS401NCSCALANCE XC208SCALANCE XR326-2C PoE WGRUGGEDCOM RSG2100PNC (32M) V4.XSCALANCE XC216-4C G EECRUGGEDCOM RS920LNCRUGGEDCOM RS910LRUGGEDCOM RS930WRUGGEDCOM RSG2100NC(32M) V5.XRUGGEDCOM RSG2100 (32M) V5.XRUGGEDCOM RSG2288NC V5.XSCALANCE XP208RUGGEDCOM RS416Pv2 V4.XRUGGEDCOM RS1600SCALANCE XP208GRUGGEDCOM i801NCRUGGEDCOM RS940GRUGGEDCOM RSG2100NC(32M) V4.XSCALANCE XP216EEC (V2)RUGGEDCOM i800NCRUGGEDCOM RS910RUGGEDCOM RSG908CSIPLUS NET SCALANCE XC208RUGGEDCOM RS8000NCRUGGEDCOM RS900NC(32M) V4.XSCALANCE XB205-3LD (SC, E/IP)SCALANCE XP216RUGGEDCOM RS920LSCALANCE XP208PoE EECRUGGEDCOM RMC8388 V4.XSCALANCE XB213-3LD (SC, PN)RUGGEDCOM RS8000HSCALANCE XF204-2BARUGGEDCOM RS900LNCRUGGEDCOM RS8000TRUGGEDCOM RS910NCSCALANCE XC216-4C G (EIP Def.)SCALANCE XF204 DNASCALANCE XR526-8C, 1x230VRUGGEDCOM RS900GSCALANCE XP216GSCALANCE XC206-2G PoE EEC (54 V DC)RUGGEDCOM RS900M-STND-XXRUGGEDCOM RS900WSCALANCE XC216RUGGEDCOM RMC8388 V5.XRUGGEDCOM RS900MNC-STND-XXRUGGEDCOM RSG2100PNC (32M) V5.XRUGGEDCOM RSG910CSCALANCE XB206-2 (ST/BFOC)SCALANCE XC206-2 (ST/BFOC)SCALANCE XF204GRUGGEDCOM RSG2288 V4.XRUGGEDCOM RS1600NCRUGGEDCOM RS969RUGGEDCOM RS900 (32M) V4.XSCALANCE XR328-4C WG (24XFE, 4XGE, 24V)RUGGEDCOM RSG909RSCALANCE XP208EECSCALANCE XP216G PoE EECRUGGEDCOM RSG2100PRUGGEDCOM RS930LNCRUGGEDCOM RS416PSCALANCE XR524-8C, 24VSCALANCE XF204-2BA DNARUGGEDCOM RSG920P V5.XSCALANCE XC206-2 (SC)RUGGEDCOM RSG2200NCRUGGEDCOM RS8000HNCRUGGEDCOM RSG2300PNC V5.XRUGGEDCOM RSG2288 V5.XRUGGEDCOM RS1600FSCALANCE XC208EECRUGGEDCOM RS416NCRUGGEDCOM RS930LRUGGEDCOM RSG907RSCALANCE XC208GSCALANCE XR524-8C, 2x230V (L3 int.)RUGGEDCOM RSG2300P V5.XSCALANCE XB216 (E/IP)SCALANCE XF204SCALANCE XR528-6MSCALANCE XP208G EECRUGGEDCOM RS910WRUGGEDCOM RSG2300 V5.XSCALANCE XC206-2SFP GSCALANCE XC206-2SFP G (EIP DEF.)SCALANCE XB205-3 (ST, E/IP)SCALANCE XB206-2 SCSIPLUS NET SCALANCE XC216-4CSCALANCE XC208G PoERUGGEDCOM RS940GNCSCALANCE XC224-4C G (EIP Def.)RUGGEDCOM RS900GNCRUGGEDCOM RSG2100P (32M) V4.XRUGGEDCOM RMC8388NC V5.XRUGGEDCOM RS910LNCRUGGEDCOM RSG2288NC V4.XRUGGEDCOM RSG2488 V5.XSCALANCE XM408-8C (L3 int.)RUGGEDCOM RMC30SCALANCE XM408-8CSCALANCE XP208G PPSCALANCE XB213-3LD (SC, E/IP)SCALANCE XB205-3LD (SC, PN)SCALANCE XB205-3 (SC, PN)SCALANCE XP216POE EECRUGGEDCOM RS8000ANCRUGGEDCOM RMC8388NC V4.XRUGGEDCOM RS1600TSCALANCE XR552-12MRUGGEDCOM RS900G (32M) V5.XSCALANCE XP216 (V2)RUGGEDCOM RS400NCRUGGEDCOM RS900MNC-GETS-C01RUGGEDCOM RS900M-GETS-C01SCALANCE XP208 (Ethernet/IP)RUGGEDCOM RSG2488NC V4.XSCALANCE XB206-2 LDRUGGEDCOM RP110RUGGEDCOM i801SCALANCE XC208G (EIP def.)RUGGEDCOM RS416v2 V4.XSCALANCE XR528-6M (L3 int.)RUGGEDCOM RS416NCv2 V4.XSCALANCE XR526-8C, 1x230V (L3 int.)SCALANCE XR552-12M (2HR2, L3 int.)RUGGEDCOM RS8000TNCSCALANCE XB205-3 (ST, PN)SCALANCE XB208 (E/IP)RUGGEDCOM RSG2300P V4.XRUGGEDCOM RS416v2 V5.XSCALANCE XP216G EECRUGGEDCOM RS920WRUGGEDCOM M2200RUGGEDCOM RS900MNC-GETS-XXRUGGEDCOM RSG2300NC V5.XSCALANCE XP208G PoE EECRUGGEDCOM RS900GNC(32M) V4.XRUGGEDCOM RS900SCALANCE XR524-8C, 1x230VSCALANCE XC206-2G PoE (54 V DC)RUGGEDCOM RSG2100RUGGEDCOM M969NCRUGGEDCOM RS416PNCRUGGEDCOM RS1600FNCSCALANCE XB213-3 (ST, PN)RUGGEDCOM RS400RUGGEDCOM RS900NC(32M) V5.XSCALANCE XR526-8C, 24V (L3 int.)SIPLUS NET SCALANCE XC206-2RUGGEDCOM RS1600TNCRUGGEDCOM RS900G (32M) V4.XSCALANCE XC208G PoE (54 V DC)RUGGEDCOM M969RUGGEDCOM RS416PNCv2 V4.XSCALANCE XB206-2 STSIPLUS NET SCALANCE XC206-2SFPRUGGEDCOM M2200NCSCALANCE XC206-2G PoERUGGEDCOM RS8000ASCALANCE XB213-3 (SC, PN)RUGGEDCOM i803RUGGEDCOM RSG2100PNCSCALANCE XC216-3G PoE (54 V DC)RUGGEDCOM RSG920PNC V5.XSCALANCE XM416-4C (L3 int.)RUGGEDCOM RSG2100NCSCALANCE XR524-8C, 24V (L3 int.)SCALANCE XC224RUGGEDCOM RP110NCSCALANCE XR526-8C, 24VRUGGEDCOM RSG2200RUGGEDCOM RSG2488NC V5.XRUGGEDCOM RSL910NCRUGGEDCOM RS969NCRUGGEDCOM RS416SCALANCE XR528-6M (2HR2)SCALANCE XC206-2SFP EECSCALANCE XR552-12M (2HR2)RUGGEDCOM RST2228PRUGGEDCOM i800SCALANCE XM408-4CRUGGEDCOM RS900M-STND-C01RUGGEDCOM RS900M-GETS-XXRUGGEDCOM RST916PRUGGEDCOM RS416PNCv2 V5.XSCALANCE XC216-4C GSCALANCE XC216EECRUGGEDCOM RS416NCv2 V5.XSCALANCE XC216-3G PoESCALANCE XP216PoE EEC (V2)SCALANCE XR524-8C, 1x230V (L3 int.)RUGGEDCOM RSG2100 (32M) V4.XSCALANCE XR528-6M (2HR2, L3 int.)SCALANCE XB206-2LDSCALANCE XC224-4C G EECRUGGEDCOM RSL910SCALANCE XB208 (PN)SCALANCE XC206-2SFP G EECSCALANCE XP216 (Ethernet/IP)SCALANCE XR324WG (24 X FE, DC 24V)SCALANCE XR328-4C WG (28xGE, DC 24V)RUGGEDCOM RST916CRUGGEDCOM RS900GPRUGGEDCOM RS900GPNCSCALANCE XR324WG (24 x FE, AC 230V)RUGGEDCOM RSG2488 V4.XSCALANCE XR526-8C, 2x230V (L3 int.)SCALANCE XR524-8C, 2x230VRUGGEDCOM i802SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)RUGGEDCOM RS900GNC(32M) V5.XSCALANCE XC216-4CSCALANCE XB216 (PN)SCALANCE XM416-4CSCALANCE XP216EECSCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)RUGGEDCOM RST2228RUGGEDCOM RS401RUGGEDCOM RSG2300NC V4.XRUGGEDCOM RSG920PNC V4.XSCALANCE XC224-4C GSCALANCE XR328-4C WG (28xGE, AC 230V)RUGGEDCOM i802NCRUGGEDCOM i803NCSCALANCE XB213-3 (SC, E/IP)RUGGEDCOM M2100SCALANCE XC208G EECRUGGEDCOM RSG2300PNC V4.XRUGGEDCOM RS900NCSCALANCE XR326-2C PoE WG (without UL)SCALANCE XM408-4C (L3 int.)RUGGEDCOM RS416Pv2 V5.XRUGGEDCOM RMC30NCSCALANCE XR526-8C, 2x230VSCALANCE XB206-2 (SC)SCALANCE XC206-2SFPRUGGEDCOM RS900 (32M) V5.XRUGGEDCOM M2100NCRUGGEDCOM RSG2100P (32M) V5.X
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-665
Improper Initialization
CVE-2018-17906
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.8||HIGH
EPSS-0.43% / 62.11%
||
7 Day CHG~0.00%
Published-19 Nov, 2018 | 20:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Philips iSite and IntelliSpace PACS, iSite PACS, all versions, and IntelliSpace PACS, all versions. Default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.

Action-Not Available
Vendor-n/aPhilips
Product-intellispace_pacsisite_pacsPhilips iSite and IntelliSpace PACS
CWE ID-CWE-521
Weak Password Requirements
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-31930
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.04% / 13.09%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 09:38
Updated-13 May, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (All versions < V2.135), IEC 1Ph 7.4kW Child socket/ shutter (8EM1310-2EN04-0GA0) (All versions < V2.135), IEC 1Ph 7.4kW Parent cable 7m (8EM1310-2EJ04-3GA1) (All versions < V2.135), IEC 1Ph 7.4kW Parent cable 7m incl. SIM (8EM1310-2EJ04-3GA2) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket (8EM1310-2EH04-3GA1) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket incl. SIM (8EM1310-2EH04-3GA2) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket/ shutter (8EM1310-2EN04-3GA1) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket/ shutter SIM (8EM1310-2EN04-3GA2) (All versions < V2.135), IEC 3Ph 22kW Child cable 7m (8EM1310-3EJ04-0GA0) (All versions < V2.135), IEC 3Ph 22kW Child socket (8EM1310-3EH04-0GA0) (All versions < V2.135), IEC 3Ph 22kW Child socket/ shutter (8EM1310-3EN04-0GA0) (All versions < V2.135), IEC 3Ph 22kW Parent cable 7m (8EM1310-3EJ04-3GA1) (All versions < V2.135), IEC 3Ph 22kW Parent cable 7m incl. SIM (8EM1310-3EJ04-3GA2) (All versions < V2.135), IEC 3Ph 22kW Parent socket (8EM1310-3EH04-3GA1) (All versions < V2.135), IEC 3Ph 22kW Parent socket incl. SIM (8EM1310-3EH04-3GA2) (All versions < V2.135), IEC 3Ph 22kW Parent socket/ shutter (8EM1310-3EN04-3GA1) (All versions < V2.135), IEC 3Ph 22kW Parent socket/ shutter SIM (8EM1310-3EN04-3GA2) (All versions < V2.135), IEC ERK 3Ph 22 kW Child cable 7m (8EM1310-3FJ04-0GA0) (All versions < V2.135), IEC ERK 3Ph 22 kW Child cable 7m (8EM1310-3FJ04-0GA1) (All versions < V2.135), IEC ERK 3Ph 22 kW Child cable 7m (8EM1310-3FJ04-0GA2) (All versions < V2.135), IEC ERK 3Ph 22 kW Child socket (8EM1310-3FH04-0GA0) (All versions < V2.135), IEC ERK 3Ph 22 kW Parent socket (8EM1310-3FH04-3GA1) (All versions < V2.135), IEC ERK 3Ph 22 kW Parent socket incl. SI (8EM1310-3FH04-3GA2) (All versions < V2.135), UL Commercial Cellular 48A NTEP (8EM1310-5HF14-1GA2) (All versions < V2.135), UL Commercial Child 40A w/ 15118 HW (8EM1310-4CF14-0GA0) (All versions < V2.135), UL Commercial Child 48A BA Compliant (8EM1315-5CG14-0GA0) (All versions < V2.135), UL Commercial Child 48A w/ 15118 HW (8EM1310-5CF14-0GA0) (All versions < V2.135), UL Commercial Parent 40A with Simcard (8EM1310-4CF14-1GA2) (All versions < V2.135), UL Commercial Parent 48A (USPS) (8EM1317-5CG14-1GA2) (All versions < V2.135), UL Commercial Parent 48A BA Compliant (8EM1315-5CG14-1GA2) (All versions < V2.135), UL Commercial Parent 48A with Simcard BA (8EM1310-5CF14-1GA2) (All versions < V2.135), UL Commercial Parent 48A, 15118, 25ft (8EM1310-5CG14-1GA1) (All versions < V2.135), UL Commercial Parent 48A, 15118, 25ft (8EM1314-5CG14-2FA2) (All versions < V2.135), UL Commercial Parent 48A, 15118, 25ft (8EM1315-5HG14-1GA2) (All versions < V2.135), UL Commercial Parent 48A,15118 25ft Sim (8EM1310-5CG14-1GA2) (All versions < V2.135), VersiCharge Blue™ 80A AC Cellular (8EM1315-7BG16-1FH2) (All versions < V2.135). Affected devices contain Modbus service enabled by default. This could allow an attacker connected to the same network to remotely control the EV charger.

Action-Not Available
Vendor-Siemens AG
Product-IEC 3Ph 22kW Child socket/ shutterIEC 1Ph 7.4kW Parent socket incl. SIMUL Commercial Parent 48A (USPS)UL Commercial Child 40A w/ 15118 HWIEC 1Ph 7.4kW Child socket/ shutterIEC 1Ph 7.4kW Parent cable 7m incl. SIMIEC ERK 3Ph 22 kW Parent socket incl. SIUL Commercial Parent 48A BA CompliantIEC 1Ph 7.4kW Parent socket/ shutterIEC 3Ph 22kW Parent socket incl. SIMVersiCharge Blue™ 80A AC CellularUL Commercial Child 48A w/ 15118 HWUL Commercial Parent 40A with SimcardIEC 3Ph 22kW Parent cable 7m incl. SIMIEC ERK 3Ph 22 kW Child cable 7mUL Commercial Parent 48A,15118 25ft SimUL Commercial Parent 48A, 15118, 25ftIEC ERK 3Ph 22 kW Child socketIEC 1Ph 7.4kW Parent socket/ shutter SIMIEC 3Ph 22kW Parent cable 7mUL Commercial Child 48A BA CompliantIEC 3Ph 22kW Parent socket/ shutterUL Commercial Cellular 48A NTEPIEC 3Ph 22kW Child cable 7mIEC 1Ph 7.4kW Parent cable 7mIEC 3Ph 22kW Parent socket/ shutter SIMIEC 3Ph 22kW Parent socketIEC ERK 3Ph 22 kW Parent socketUL Commercial Parent 48A with Simcard BAIEC 1Ph 7.4kW Parent socketIEC 3Ph 22kW Child socketIEC 1Ph 7.4kW Child socket
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2025-25271
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.8||HIGH
EPSS-0.03% / 7.44%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 07:01
Updated-22 Jul, 2025 | 07:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCPP Backend Configuration via Insecure Defaults

An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3100charx_sec-3150charx_sec-3050_firmwarecharx_sec-3050charx_sec-3100_firmwarecharx_sec-3150_firmwarecharx_sec-3000_firmwarecharx_sec-3000CHARX SEC-3100CHARX SEC-3150CHARX SEC-3000CHARX SEC-3050
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
Details not found