CVE-2025-68707
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-02-13
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tycc | tongyu_ax1800_firmware | 1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-288 | The product requires authentication, but the product has an alternate path or channel that does not require authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an authentication bypass in the Tongyu AX1800 Wi-Fi 6 Router firmware 1.0.0. It allows attackers who are on the same network and do not have credentials to make arbitrary configuration changes to the router, as long as there is an active valid admin session. Attackers can access sensitive endpoints like /boaform/formSaveConfig and /boaform/admin without authentication.
How can this vulnerability impact me? :
This vulnerability can lead to a full compromise of the affected router device. An attacker can change configurations without authentication, potentially disrupting network operations, exposing sensitive network settings, or enabling further attacks through the compromised device.