Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kaysus
Kaysus ks-wr1200 Kaysus ks-wr1200 Firmware |
|
| CPEs | cpe:2.3:h:kaysus:ks-wr1200:-:*:*:*:*:*:*:* cpe:2.3:o:kaysus:ks-wr1200_firmware:107:*:*:*:*:*:*:* |
|
| Vendors & Products |
Kaysus
Kaysus ks-wr1200 Kaysus ks-wr1200 Firmware |
Thu, 08 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. (Changing the management GUI password does not affect SSH/TELNET authentication.) Any LAN-adjacent attacker can trivially log in with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-08T21:22:55.946Z
Reserved: 2025-12-24T00:00:00.000Z
Link: CVE-2025-68718
Updated: 2026-01-08T21:22:48.850Z
Status : Analyzed
Published: 2026-01-08T21:15:43.503
Modified: 2026-02-02T16:28:35.850
Link: CVE-2025-68718
No data.
OpenCVE Enrichment
No data.