CVE-2025-68716: KAYSUS KS-WR3600 Router Vulnerability Vulnerability Description: KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges. Vulnerability Type: Incorrect Access Control Vendor of Product: KAYSUS Affected Product Code Base: KAYSUS KS-WR3600, Software V1.0.5.9.1 - Software V1.0.5.9.1 Affected Component: SSH service Attack Type: Remote Impact Code Execution: true Impact Denial of Service: true Impact Escalation of Privileges: true Impact Information Disclosure: true Attack Vectors: A LAN-adjacent attacker can connect to the router's SSH service and log in directly as root without a password. The service is enabled by default. Reference: - https://www.kaysus.com/ks_wr3600__wifi_7_be3600_wireless_router.html - https://github.com/actuator/cve/tree/main/KAYSUS Discoverer: Edward Warren