KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.
History

Thu, 08 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
Description KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-08T20:38:47.470Z

Reserved: 2025-12-24T00:00:00.000Z

Link: CVE-2025-68717

cve-icon Vulnrichment

Updated: 2026-01-08T20:38:14.851Z

cve-icon NVD

Status : Received

Published: 2026-01-08T21:15:43.353

Modified: 2026-01-08T21:15:43.353

Link: CVE-2025-68717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.