KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.
References
| Link | Resource |
|---|---|
| https://github.com/actuator/cve/blob/main/KAYSUS/CVE-2025-68717.txt | Third Party Advisory |
| https://github.com/actuator/cve/tree/main/KAYSUS | Exploit |
| https://www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 21:15
Updated : 2026-02-02 16:35
NVD link : CVE-2025-68717
Mitre link : CVE-2025-68717
CVE.ORG link : CVE-2025-68717
JSON object : View
Products Affected
kaysus
- ks-wr3600_firmware
- ks-wr3600
CWE
CWE-287
Improper Authentication
