Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68716: n/a

0
High
VulnerabilityCVE-2025-68716cvecve-2025-68716
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.

AI-Powered Analysis

AILast updated: 01/08/2026, 20:53:52 UTC

Technical Analysis

CVE-2025-68716 is a critical vulnerability found in KAYSUS KS-WR3600 routers running firmware version 1.0.5.9.1. The vulnerability arises because the SSH service is enabled by default on the LAN interface, and the root account is configured with no password. Furthermore, administrators are unable to disable SSH or enforce any form of authentication through the router’s command-line interface or web GUI. This design flaw allows any attacker with access to the local area network to trivially obtain root shell access on the device. Once access is gained, the attacker can execute arbitrary commands with full administrative privileges, compromising the router’s confidentiality, integrity, and availability. The vulnerability does not require any user interaction or prior authentication, making it highly exploitable. Although no known exploits have been reported in the wild, the lack of patch availability and the inability to disable or secure SSH access make this a severe threat. The affected firmware version is 1.0.5.9.1, but no other versions are specified. The vulnerability was published in early 2026, with the CVSS score not assigned yet. The root cause is a default insecure configuration combined with a lack of administrative control over SSH settings, which is a critical security oversight in the device’s firmware design.

Potential Impact

For European organizations, this vulnerability could lead to complete compromise of affected routers, enabling attackers to intercept, modify, or disrupt network traffic, launch further attacks within the internal network, or create persistent backdoors. This is especially critical for enterprises, government agencies, and critical infrastructure operators relying on these routers for secure network connectivity. The inability to disable or secure SSH access increases the attack surface and risk of lateral movement within networks. Confidential information could be exposed, network integrity compromised, and availability disrupted, potentially causing operational downtime and data breaches. Organizations with less stringent LAN access controls or remote LAN access (e.g., via VPN) are particularly vulnerable. The threat also extends to managed service providers and small-to-medium enterprises that may use these routers without rigorous security oversight.

Mitigation Recommendations

1. Immediately isolate affected KS-WR3600 routers from untrusted LAN segments and restrict access to trusted administrators only. 2. Implement strict network segmentation and access control lists (ACLs) to limit LAN access to these devices. 3. Monitor network traffic for unusual SSH connections or command execution patterns on these routers. 4. Replace affected routers with models from vendors with secure default configurations if possible. 5. If replacement is not immediately feasible, consider deploying network-based intrusion prevention systems (IPS) to detect and block unauthorized SSH access attempts. 6. Engage with KAYSUS support to obtain firmware updates or patches addressing this vulnerability. 7. Educate network administrators about the risks and ensure physical security of network equipment to prevent unauthorized LAN access. 8. Review and enhance internal network security policies to prevent unauthorized device access. 9. Regularly audit router configurations and network access logs for signs of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-24T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696015f101d35e5d0ca3aff6

Added to database: 1/8/2026, 8:39:13 PM

Last enriched: 1/8/2026, 8:53:52 PM

Last updated: 2/7/2026, 2:36:25 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats