Taiko AG1000-01A SMS Alert Gateway Hardcoded Credentials Vulnerability (CVE-2026-9139)
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability (CVE-2026-9139) in the embedded web configuration interface, allowing unauthenticated attackers with network access to recover administrative credentials directly from client-side JavaScript and gain full administrative access to the device.
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 are vulnerable to a critical security flaw (CVE-2026-9139) due to hard-coded credentials in the device’s web configuration interface. The vulnerability stems from the authentication mechanism being implemented entirely in client-side JavaScript within the login.zhtml page. The static plaintext credentials are exposed directly in the page source, making them easily accessible to anyone with network access to the device. This vulnerability allows an unauthenticated attacker to recover administrative credentials and gain full administrative access, posing a significant risk to the device and potentially the wider network it is connected to.
Attack Chain
- Attacker gains network access to the Taiko AG1000-01A SMS Alert Gateway device.
- Attacker navigates to the device’s web configuration interface, typically accessible via a web browser.
- The web browser downloads the login.zhtml page containing the client-side JavaScript code.
- Attacker views the page source of login.zhtml.
- Attacker identifies the validate() function within the JavaScript code.
- Attacker extracts the hard-coded plaintext administrative credentials from the validate() function.
- Attacker uses the recovered credentials to log in to the web configuration interface as an administrator.
- Attacker gains full administrative control of the Taiko AG1000-01A SMS Alert Gateway device.
Impact
Successful exploitation of this vulnerability grants an attacker full administrative access to the Taiko AG1000-01A SMS Alert Gateway. This could lead to unauthorized modification of device settings, disruption of SMS alert services, or potential use of the device as a pivot point for further attacks within the network. Given the critical nature of alert gateways in many operational environments, the impact could range from missed alerts to significant operational disruptions.
Recommendation
- Implement the following rule to detect access to the login page: “Detect Access to Taiko AG1000 Login Page”.
- Deploy the “Detect Taiko AG1000 Login Attempt with Exposed Credentials” Sigma rule to your SIEM and tune for your environment.
- Disable the web configuration interface on Taiko AG1000-01A SMS Alert Gateway devices if it is not required.
- Apply provided patch or upgrade to a version of Taiko AG1000-01A SMS Alert Gateway that addresses CVE-2026-9139.
Detection coverage 2
Detect Access to Taiko AG1000 Login Page
lowDetects access to the Taiko AG1000 SMS Alert Gateway login page, potentially indicating reconnaissance activity.
Detect Taiko AG1000 Login Attempt with Exposed Credentials
highDetects requests to the Taiko AG1000 SMS Alert Gateway web interface from IPs known to host attack infrastructure.
Detection queries are available on the platform. Get full rules →