KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Feb 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kaysus
Kaysus ks-wr3600 Kaysus ks-wr3600 Firmware |
|
| CPEs | cpe:2.3:h:kaysus:ks-wr3600:-:*:*:*:*:*:*:* cpe:2.3:o:kaysus:ks-wr3600_firmware:1.0.5.9.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Kaysus
Kaysus ks-wr3600 Kaysus ks-wr3600 Firmware |
Thu, 08 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authentication. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-01-08T00:00:00.000Z
Updated: 2026-01-08T20:38:47.470Z
Reserved: 2025-12-24T00:00:00.000Z
Link: CVE-2025-68717
Updated: 2026-01-08T20:38:14.851Z
Status : Analyzed
Published: 2026-01-08T21:15:43.353
Modified: 2026-02-02T16:35:48.640
Link: CVE-2025-68717
No data.