CVE-2025-63362
Published: 04 December 2025
Description
Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, and correction of the authentication bypass flaw via firmware updates or patches.
Mandates management of authenticators to ensure sufficient strength of mechanism, preventing the setting of blank administrator passwords.
Requires validation of information inputs to the web interface password change function, rejecting blank username and password values.
Security SummaryAI
CVE-2025-63362 is a critical authentication bypass vulnerability in the Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway, specifically affecting Firmware V3.1.1.0, Hardware version 4.3.2.1, and Webpage V7.04T.07.002880.0301. The flaw, mapped to CWE-620 (Unverified Password Change), enables attackers to set the Administrator username and password to blank values, effectively circumventing authentication controls. Published on 2025-12-04, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact.
The vulnerability can be exploited by any remote attacker with network access to the device's web interface, requiring no privileges, user interaction, or special conditions due to its low attack complexity. Successful exploitation allows attackers to gain unauthorized administrative access, potentially leading to full compromise of the gateway's configuration, data confidentiality, integrity, and availability.
Advisories and additional details are available in the referenced sources: https://drive.google.com/file/d/1AGv9KWMTB71NJfIOncuNO6FyK0UAqxmL/view?usp=sharing and https://otsecverse.github.io/OTSecVerse/posts/Post-2/. Practitioners should consult these for specific mitigation guidance, such as firmware updates or configuration hardening.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a critical authentication bypass in the public-facing web interface of a network gateway device, directly enabling remote exploitation for unauthorized administrative access via T1190: Exploit Public-Facing Application.