Cyber Posture

CVE-2025-63362

CriticalPublic PoC

Published: 04 December 2025

Published
04 December 2025
Modified
15 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and correction of the authentication bypass flaw via firmware updates or patches.

prevent

Mandates management of authenticators to ensure sufficient strength of mechanism, preventing the setting of blank administrator passwords.

prevent

Requires validation of information inputs to the web interface password change function, rejecting blank username and password values.

Security SummaryAI

CVE-2025-63362 is a critical authentication bypass vulnerability in the Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway, specifically affecting Firmware V3.1.1.0, Hardware version 4.3.2.1, and Webpage V7.04T.07.002880.0301. The flaw, mapped to CWE-620 (Unverified Password Change), enables attackers to set the Administrator username and password to blank values, effectively circumventing authentication controls. Published on 2025-12-04, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact.

The vulnerability can be exploited by any remote attacker with network access to the device's web interface, requiring no privileges, user interaction, or special conditions due to its low attack complexity. Successful exploitation allows attackers to gain unauthorized administrative access, potentially leading to full compromise of the gateway's configuration, data confidentiality, integrity, and availability.

Advisories and additional details are available in the referenced sources: https://drive.google.com/file/d/1AGv9KWMTB71NJfIOncuNO6FyK0UAqxmL/view?usp=sharing and https://otsecverse.github.io/OTSecVerse/posts/Post-2/. Practitioners should consult these for specific mitigation guidance, such as firmware updates or configuration hardening.

Details

CWE(s)

Affected Products

waveshare
rs232\/485 to wifi eth \(b\) firmware
3.1.1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a critical authentication bypass in the public-facing web interface of a network gateway device, directly enabling remote exploitation for unauthorized administrative access via T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References