CVE-2026-9139
Taiko · AG1000-01A SMS Alert Gateway
The Taiko AG1000-01A SMS Alert Gateway exposes hard-coded administrative credentials via client-side JavaScript in its configuration interface.
Executive summary
Hard-coded credentials in the Taiko SMS Alert Gateway web interface allow unauthenticated attackers to gain full administrative access to the device.
Vulnerability
This is a hard-coded credential vulnerability. Authentication logic is handled entirely in client-side JavaScript, which exposes plaintext credentials in the source code of the login page.
Business impact
An attacker can easily extract administrative credentials to gain full control over the SMS Alert Gateway. This could allow for interception of SMS traffic, disruption of alert notifications, or use of the device as a foothold in the internal network. The 9.8 CVSS score emphasizes the severity of this access control failure.
Remediation
Immediate Action: Update the device firmware to the latest manufacturer-provided version.
Proactive Monitoring: Monitor network traffic for unauthorized access to the web management interface and look for unusual administrative logins.
Compensating Controls: Isolate the SMS Alert Gateway on a dedicated, non-routable management VLAN to restrict access to only authorized users.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Administrative access to security-critical hardware must be protected by robust, server-side authentication. Organizations must apply firmware updates immediately and restrict network access to the gateway interface.