CVE-2025-68717
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Lifecycle Timeline
3Description
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.
Analysis
KAYSUS KS-WR3600 router (firmware 1.0.5.9.1) has session validation bypass – if any user is logged in, endpoints accept unauthenticated requests. Attackers piggyback on active sessions to execute privileged actions. PoC available.
Technical Context
The session validation logic (CWE-287) checks only whether any active session exists, not whether the current request belongs to that session. An empty or invalid session cookie succeeds as long as someone else is logged in.
Affected Products
KAYSUS KS-WR3600 firmware 1.0.5.9.1
Remediation
Update firmware when available. Restrict management access to wired connections.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today