KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. (Changing the management GUI password does not affect SSH/TELNET authentication.) Any LAN-adjacent attacker can trivially log in with root privileges.
References
| Link | Resource |
|---|---|
| https://github.com/actuator/cve/blob/main/KAYSUS/CVE-2025-68718.txt | Third Party Advisory |
| https://github.com/actuator/cve/tree/main/KAYSUS | Exploit |
| https://www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 21:15
Updated : 2026-02-02 16:28
NVD link : CVE-2025-68718
Mitre link : CVE-2025-68718
CVE.ORG link : CVE-2025-68718
JSON object : View
Products Affected
kaysus
- ks-wr1200_firmware
- ks-wr1200
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
