CVE-2025-68718
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-08

Last updated on: 2026-02-02

Assigner: MITRE

Description
KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. (Changing the management GUI password does not affect SSH/TELNET authentication.) Any LAN-adjacent attacker can trivially log in with root privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-08
Last Modified
2026-02-02
Generated
2026-05-07
AI Q&A
2026-01-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
kaysus ks-wr1200 107
kaysus ks-wr1200_firmware 107
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in KAYSUS KS-WR1200 routers with firmware 107 is that SSH and TELNET services are exposed on the LAN interface with hardcoded root credentials (username: root, password: 12345678). The administrator cannot disable these services or change the hardcoded password, and changing the management GUI password does not affect SSH/TELNET authentication. This means any attacker on the LAN side can easily log in with root privileges.


How can this vulnerability impact me? :

This vulnerability allows any attacker with access to the LAN to gain root-level access to the router. This can lead to unauthorized control over the device, potential interception or manipulation of network traffic, disruption of network services, and further compromise of connected devices.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by scanning your LAN network for devices exposing SSH or TELNET services on the KAYSUS KS-WR1200 router. Since the router uses hardcoded root credentials (root:12345678), you can attempt to connect via SSH or TELNET using these credentials to verify if the device is vulnerable. For example, use commands like: - SSH: ssh root@<router_ip> (then enter password 12345678) - TELNET: telnet <router_ip> (then login as root with password 12345678) Additionally, network scanning tools like nmap can be used to detect open SSH (port 22) and TELNET (port 23) services on LAN devices: - nmap -p 22,23 <network_range> If these services are open and accessible, the device may be vulnerable.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include isolating the affected KAYSUS KS-WR1200 routers from the LAN to prevent unauthorized access, since the SSH and TELNET services cannot be disabled or have their hardcoded passwords changed. Restrict LAN access to these devices by implementing network segmentation or firewall rules to block SSH and TELNET ports (22 and 23) to the router. Consider replacing the device with a more secure alternative or contacting the vendor for firmware updates or patches addressing this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart