This vulnerability has been fixed in firmware version: 1.00.67 for CG3000TC and 1.00.27 for CG3000T.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://cert.pl/posts/2026/01/CVE-2025-7072/ |
|
Fri, 09 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credentials in clear text (shared across all routers of this model) that an unauthenticated remote attacker could use to execute commands with root privileges. This vulnerability has been fixed in firmware version: 1.00.67 for CG3000TC and 1.00.27 for CG3000T. | |
| Title | Hardcoded credentials in KAON CG3000T/CG3000CT routers | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-01-09T16:24:39.454Z
Reserved: 2025-07-04T14:57:43.494Z
Link: CVE-2025-7072
Updated: 2026-01-09T16:24:32.204Z
Status : Received
Published: 2026-01-09T12:15:54.020
Modified: 2026-01-09T12:15:54.020
Link: CVE-2025-7072
No data.
OpenCVE Enrichment
No data.