关键漏洞信息 漏洞ID: CVE-2025-68707 漏洞描述: - AX1800 Wi-Fi 6 Router with firmware 1.0.0 allows unauthenticated network-adjacent attackers to perform arbitrary configuration changes without providing credentials, as long as a valid admin session is active. This can result in full compromise of the device via unauthenticated access to /boaform/formSaveConfig and /boaform/admin endpoints. - CWE-288: Authentication Bypass Using an Alternate Path or Channel 厂商及产品: - [Vendor of Product]: Tongyu Communications - [Affected Product Code Base]: Tongyu Communications AX1800 Wi-Fi 6 Router - Firmware Version: V1.0.0 受影响的组件: -Endpoints including but not limited to: boaform/formSaveConfig, boaform/admin; lacks proper session enforcement in administrative handler logic across router management interface. 攻击类型: Remote 影响: - [Impact Denial of Service]: true - [Impact Escalation of Privileges]: true - [Impact Information Disclosure]: true 攻击向量: An unauthenticated attacker on the LAN can access the router s administrative endpoints (i.e., /boaform/formSaveConfig) 参考链接: - https://www.tongyucom.com/product/ax1800.html - https://github.com/actuator/cve/tree/main/Tongyu 发现者: Edward Warren