KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration management. Once any user is logged in and maintains an active session, an attacker can directly query the backup endpoint and download a full configuration archive. This archive contains sensitive files such as /etc/shadow, enabling credential recovery and potential full compromise of the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 08 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-552
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 21:00:00 +0000

Type Values Removed Values Added
Description KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration management. Once any user is logged in and maintains an active session, an attacker can directly query the backup endpoint and download a full configuration archive. This archive contains sensitive files such as /etc/shadow, enabling credential recovery and potential full compromise of the device.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-08T20:59:58.111Z

Reserved: 2025-12-24T00:00:00.000Z

Link: CVE-2025-68719

cve-icon Vulnrichment

Updated: 2026-01-08T20:58:53.600Z

cve-icon NVD

Status : Received

Published: 2026-01-08T21:15:43.603

Modified: 2026-01-08T21:15:43.603

Link: CVE-2025-68719

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses