CVE-2025-68717
Published: 08 January 2026
Description
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's…
more
active session to retrieve sensitive configuration data or execute privileged actions without authentication.
Mitigating Controls (NIST 800-53 r5)AI
SC-23 requires mechanisms to protect the authenticity of communications sessions, directly preventing authentication bypass via invalid or empty session values.
AC-3 enforces approved authorizations for access to resources, ensuring endpoints reject unauthenticated requests even if a legitimate user is logged in.
IA-11 mandates re-authentication for privileged actions, mitigating bypass risks by requiring fresh validation beyond initial session establishment.
Security SummaryAI
CVE-2025-68717 is an authentication bypass vulnerability in KAYSUS KS-WR3600 routers running firmware version 1.0.5.9.1. The issue stems from flawed session validation, where endpoints such as /cgi-bin/system-tool accept requests with empty or invalid session values if any legitimate user is logged in. This design flaw, classified as CWE-287 (Improper Authentication), carries a CVSS v3.1 base score of 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L), indicating critical severity due to high impacts on confidentiality and integrity.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By piggybacking on an active legitimate user's session, they can retrieve sensitive configuration data or execute privileged actions without authentication.
Advisories and additional details are available in the referenced sources, including https://github.com/actuator/cve/blob/main/KAYSUS/CVE-2025-68717.txt, https://github.com/actuator/cve/tree/main/KAYSUS, and the product page at https://www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of public-facing router web interface (T1190) for authentication bypass, directly facilitating retrieval of sensitive configuration data (T1602.002).