Home

Description

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.

PUBLISHED Reserved 2025-12-24 | Published 2026-01-08 | Updated 2026-01-08 | Assigner mitre

References

www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html

github.com/actuator/cve/tree/main/KAYSUS

github.com/actuator/cve/blob/main/KAYSUS/CVE-2025-68717.txt

cve.org (CVE-2025-68717)

nvd.nist.gov (CVE-2025-68717)

Download JSON