KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. (Changing the management GUI password does not affect SSH/TELNET authentication.) Any LAN-adjacent attacker can trivially log in with root privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kaysus
Kaysus ks-wr1200 Kaysus ks-wr1200 Firmware |
|
| CPEs | cpe:2.3:h:kaysus:ks-wr1200:-:*:*:*:*:*:*:* cpe:2.3:o:kaysus:ks-wr1200_firmware:107:*:*:*:*:*:*:* |
|
| Vendors & Products |
Kaysus
Kaysus ks-wr1200 Kaysus ks-wr1200 Firmware |
Thu, 08 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services or change the hardcoded password. (Changing the management GUI password does not affect SSH/TELNET authentication.) Any LAN-adjacent attacker can trivially log in with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-08T21:22:55.946Z
Reserved: 2025-12-24T00:00:00.000Z
Link: CVE-2025-68718
Updated: 2026-01-08T21:22:48.850Z
Status : Analyzed
Published: 2026-01-08T21:15:43.503
Modified: 2026-02-02T16:28:35.850
Link: CVE-2025-68718
No data.