Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68718: n/a

0
Medium
VulnerabilityCVE-2025-68718cvecve-2025-68718
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

KAYSUS KS-WR1200 routers running firmware version 107 have a vulnerability where SSH and TELNET services are exposed on the LAN interface with hardcoded root credentials (root:12345678). These credentials cannot be changed or disabled by the administrator, and changing the GUI password does not affect SSH/TELNET access. This allows any attacker with LAN access to gain root-level control of the device without authentication barriers. The vulnerability has a CVSS score of 5. 4, indicating medium severity, with low impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. This issue poses a significant risk in environments where these routers are deployed, especially in internal networks without strict segmentation. European organizations using these routers should prioritize detection and network segmentation to mitigate risk.

AI-Powered Analysis

AILast updated: 01/15/2026, 22:05:20 UTC

Technical Analysis

The vulnerability identified as CVE-2025-68718 affects KAYSUS KS-WR1200 routers with firmware version 107. The core issue is the presence of SSH and TELNET services enabled on the LAN interface that use hardcoded root credentials (username: root, password: 12345678). These credentials are embedded in the firmware and cannot be changed or disabled by the device administrator. Importantly, changing the management GUI password does not affect the authentication for SSH or TELNET, meaning that the hardcoded credentials remain the sole access method for these services. Because these services are exposed on the LAN interface, any attacker with access to the local network segment can trivially log in with root privileges, gaining full control over the router. This can lead to unauthorized configuration changes, interception or manipulation of network traffic, and potential pivoting to other internal systems. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) because the hardcoded credentials expose sensitive access. The CVSS v3.1 score is 5.4 (medium), with the vector indicating attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No patches or mitigations have been published yet, and no exploits are currently known in the wild. The inability to disable or change these services or credentials severely limits remediation options, increasing the risk in environments where these devices are deployed without strict network segmentation.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily in internal network environments where KAYSUS KS-WR1200 routers are deployed. An attacker with LAN access—such as a malicious insider, compromised device, or visitor connected to the internal network—can gain root access to the router, potentially allowing interception or manipulation of network traffic, unauthorized configuration changes, and lateral movement within the network. This could lead to data confidentiality breaches and integrity violations, especially in sensitive sectors like finance, healthcare, or critical infrastructure. Although the vulnerability does not directly impact availability, the loss of control over network routing and security policies could indirectly cause service disruptions. The inability to change or disable the hardcoded credentials means that traditional password management policies are ineffective, increasing the risk of persistent compromise. Organizations with poor network segmentation or guest network controls are particularly vulnerable. The medium CVSS score reflects the limited attack vector (LAN adjacent) but significant privilege escalation potential.

Mitigation Recommendations

1. Immediately identify and inventory all KAYSUS KS-WR1200 routers running firmware version 107 within the network. 2. Segment networks to isolate these routers from general user LAN segments, restricting access to trusted management stations only. 3. Implement strict network access controls (e.g., 802.1X, NAC) to prevent unauthorized devices from connecting to LAN segments where these routers reside. 4. Monitor network traffic for unauthorized SSH or TELNET connections to these routers and set up alerts for suspicious login attempts. 5. Disable TELNET and SSH services at the network level using firewall rules if device-level disabling is impossible. 6. Engage with the vendor for firmware updates or patches; if none are available, consider replacing affected devices with models that do not have hardcoded credentials. 7. Educate internal staff about the risks of connecting unauthorized devices to the LAN and enforce strict physical and logical access controls. 8. Use network intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. 9. Regularly audit router configurations and logs for signs of compromise. 10. Prepare incident response plans specific to router compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-24T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69602115ecefc3cd7c4b6955

Added to database: 1/8/2026, 9:26:45 PM

Last enriched: 1/15/2026, 10:05:20 PM

Last updated: 2/6/2026, 10:27:22 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats