CVE-2025-68707
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-13

Last updated on: 2026-02-13

Assigner: MITRE

Description
An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with firmware 1.0.0 allows unauthenticated network-adjacent attackers to perform arbitrary configuration changes without providing credentials, as long as a valid admin session is active. This can result in full compromise of the device (i.e., via unauthenticated access to /boaform/formSaveConfig and /boaform/admin endpoints).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-02-13
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tycc tongyu_ax1800_firmware 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an authentication bypass in the Tongyu AX1800 Wi-Fi 6 Router firmware 1.0.0. It allows attackers who are on the same network and do not have credentials to make arbitrary configuration changes to the router, as long as there is an active valid admin session. Attackers can access sensitive endpoints like /boaform/formSaveConfig and /boaform/admin without authentication.


How can this vulnerability impact me? :

This vulnerability can lead to a full compromise of the affected router device. An attacker can change configurations without authentication, potentially disrupting network operations, exposing sensitive network settings, or enabling further attacks through the compromised device.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart