VYPR
Critical severity9.8NVD Advisory· Published May 20, 2026

CVE-2026-9141

CVE-2026-9141

Description

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session management or server-side authentication checks. Attackers with network access can directly request internal resources such as index.zhtml, point.zhtml, and log.shtml to gain full administrative read and write access, enabling unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authentication bypass in Taiko AG1000-01A SMS Alert Gateway allows unauthenticated network attackers to gain full administrative access via direct requests to internal pages.

Vulnerability

The Taiko AG1000-01A SMS Alert Gateway firmware revisions 7.3 and 8 contain an authentication bypass vulnerability in the embedded web configuration interface [1]. The interface does not enforce any session management or server-side authentication checks, allowing unauthenticated attackers to directly access internal application pages such as index.zhtml, point.zhtml, and log.shtml [1].

Exploitation

An attacker with network access to the device can exploit this vulnerability by sending HTTP requests to the unprotected internal pages without any authentication [1]. No user interaction or prior access is required. The attacker can directly navigate to administrative endpoints to perform actions.

Impact

Successful exploitation grants the attacker full administrative read and write access to the device [1]. This enables unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions [1]. The attacker can potentially compromise the entire SMS alert gateway.

Mitigation

As of the publication date (2026-05-20), no official patch has been released for this vulnerability [1]. Until a fix is available, organizations should restrict network access to the web interface, place the device behind a firewall, and implement network segmentation to limit exposure [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.