Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7072: CWE-798 Use of Hard-coded Credentials in KAON CG3000T

0
Critical
VulnerabilityCVE-2025-7072cvecve-2025-7072cwe-798
Published: Fri Jan 09 2026 (01/09/2026, 11:30:24 UTC)
Source: CVE Database V5
Vendor/Project: KAON
Product: CG3000T

Description

The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credentials in clear text (shared across all routers of this model) that an unauthenticated remote attacker could use to execute commands with root privileges. This vulnerability has been fixed in firmware version: 1.00.67 for CG3000TC and 1.00.27 for CG3000T.

AI-Powered Analysis

AILast updated: 01/09/2026, 11:53:47 UTC

Technical Analysis

CVE-2025-7072 is a high-severity vulnerability identified in the KAON CG3000TC and CG3000T router models. The root cause is the presence of hard-coded credentials embedded within the router firmware in clear text. These credentials are uniform across all devices of the affected models, enabling an unauthenticated remote attacker to leverage them to execute arbitrary commands with root privileges. The vulnerability does not require any authentication or user interaction, making it trivially exploitable remotely over the network. The impact is severe, as attackers gaining root access can manipulate router configurations, intercept or redirect traffic, deploy malware, or create persistent backdoors. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a common and dangerous security flaw. The vendor has addressed this issue in firmware versions 1.00.67 for CG3000TC and 1.00.27 for CG3000T. No known exploits have been reported in the wild yet, but the critical CVSS 4.0 score of 9.3 reflects the high risk posed by this vulnerability. The vulnerability was reserved in July 2025 and published in January 2026 by CERT-PL, indicating active tracking and disclosure by security authorities.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to complete compromise of affected routers, which are often used as gateways in enterprise and residential networks. Attackers with root access can intercept sensitive data, disrupt network availability, and pivot to internal systems, potentially leading to data breaches, espionage, or ransomware deployment. Critical infrastructure sectors such as energy, finance, healthcare, and government agencies relying on KAON CG3000T routers are particularly vulnerable. The uniformity of the hard-coded credentials increases the risk of widespread attacks once exploit code becomes available. Additionally, compromised routers can be used as launchpads for broader attacks on European networks, undermining trust in network security and causing operational disruptions.

Mitigation Recommendations

Organizations should immediately verify if KAON CG3000TC or CG3000T routers are deployed within their networks and identify firmware versions in use. The primary mitigation is to upgrade affected devices to firmware versions 1.00.67 (CG3000TC) or 1.00.27 (CG3000T) or later, which remove the hard-coded credentials. Where immediate patching is not feasible, network segmentation should be implemented to isolate vulnerable routers from critical systems and restrict remote management access. Deploy network intrusion detection systems (NIDS) to monitor for unusual command execution or unauthorized access attempts. Change default management ports and disable remote administration if not required. Additionally, organizations should audit router configurations regularly and consider replacing devices that cannot be patched promptly. Vendor communication channels should be monitored for any updates or additional patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-07-04T14:57:43.494Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960e8e3a48af7d8cea1877c

Added to database: 1/9/2026, 11:39:15 AM

Last enriched: 1/9/2026, 11:53:47 AM

Last updated: 1/10/2026, 2:15:01 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats