CVE-2026-9141

Taiko · AG1000-01A SMS Alert Gateway

The Taiko AG1000-01A SMS Alert Gateway web interface lacks server-side authentication, allowing unauthenticated attackers to access internal pages directly.

Executive summary

An authentication bypass vulnerability in the Taiko SMS Alert Gateway allows unauthenticated attackers to gain full administrative access to the device's management interface.

Vulnerability

This is an authentication bypass vulnerability. The web interface performs no server-side validation of session tokens or credentials, allowing any network-connected user to request sensitive management pages directly.

Business impact

Attackers can gain full administrative read/write access to the device, enabling them to modify alarm configurations, disrupt monitoring services, or reconfigure the device for malicious purposes. The 9.8 CVSS score reflects the critical risk of complete device compromise.

Remediation

Immediate Action: Apply the latest firmware update provided by the vendor.

Proactive Monitoring: Audit access logs for unauthorized attempts to access management pages such as index.zhtml or log.shtml.

Compensating Controls: Use strict firewall policies to block access to the management interface from all but the most trusted administrative workstations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Failure to enforce server-side authentication makes the device inherently insecure. Organizations must update their firmware and ensure the management interface is not exposed to untrusted networks.