KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.
History

Thu, 08 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-306
CWE-521
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-08T20:53:46.896Z

Reserved: 2025-12-24T00:00:00.000Z

Link: CVE-2025-68716

cve-icon Vulnrichment

Updated: 2026-01-08T20:52:30.536Z

cve-icon NVD

Status : Received

Published: 2026-01-08T21:15:43.187

Modified: 2026-01-08T21:15:43.187

Link: CVE-2025-68716

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.