KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.
References
| Link | Resource |
|---|---|
| https://github.com/actuator/cve/blob/main/KAYSUS/CVE-2025-68717.txt | Third Party Advisory |
| https://github.com/actuator/cve/tree/main/KAYSUS | Exploit |
| https://www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
02 Feb 2026, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/actuator/cve/blob/main/KAYSUS/CVE-2025-68717.txt - Third Party Advisory | |
| References | () https://github.com/actuator/cve/tree/main/KAYSUS - Exploit | |
| References | () https://www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html - Product | |
| CPE | cpe:2.3:o:kaysus:ks-wr3600_firmware:1.0.5.9.1:*:*:*:*:*:*:* cpe:2.3:h:kaysus:ks-wr3600:-:*:*:*:*:*:*:* |
|
| First Time |
Kaysus ks-wr3600
Kaysus Kaysus ks-wr3600 Firmware |
08 Jan 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-08 21:15
Updated : 2026-02-02 16:35
NVD link : CVE-2025-68717
Mitre link : CVE-2025-68717
CVE.ORG link : CVE-2025-68717
JSON object : View
Products Affected
kaysus
- ks-wr3600
- ks-wr3600_firmware
CWE
CWE-287
Improper Authentication
