Cyber Posture

CVE-2025-63362

CriticalPublic PoC

Published: 04 December 2025

Published
04 December 2025
Modified
15 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 34.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-63362 is a critical-severity Unverified Password Change (CWE-620) vulnerability in Waveshare Rs232\/485 To Wifi Eth \(B\) Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and correction of the authentication bypass flaw via firmware updates or patches.

prevent

Mandates management of authenticators to ensure sufficient strength of mechanism, preventing the setting of blank administrator passwords.

prevent

Requires validation of information inputs to the web interface password change function, rejecting blank username and password values.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a critical authentication bypass in the public-facing web interface of a network gateway device, directly enabling remote exploitation for unauthorized administrative access via T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication.

Deeper analysisAI

CVE-2025-63362 is a critical authentication bypass vulnerability in the Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway, specifically affecting Firmware V3.1.1.0, Hardware version 4.3.2.1, and Webpage V7.04T.07.002880.0301. The flaw, mapped to CWE-620 (Unverified Password Change), enables attackers to set the Administrator username and password to blank values, effectively circumventing authentication controls. Published on 2025-12-04, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact.

The vulnerability can be exploited by any remote attacker with network access to the device's web interface, requiring no privileges, user interaction, or special conditions due to its low attack complexity. Successful exploitation allows attackers to gain unauthorized administrative access, potentially leading to full compromise of the gateway's configuration, data confidentiality, integrity, and availability.

Advisories and additional details are available in the referenced sources: https://drive.google.com/file/d/1AGv9KWMTB71NJfIOncuNO6FyK0UAqxmL/view?usp=sharing and https://otsecverse.github.io/OTSecVerse/posts/Post-2/. Practitioners should consult these for specific mitigation guidance, such as firmware updates or configuration hardening.

Details

CWE(s)

Affected Products

waveshare
rs232\/485 to wifi eth \(b\) firmware
3.1.1.0

CVEs Like This One

CVE-2024-12824Shared CWE-620
CVE-2025-1107Shared CWE-620
CVE-2024-13373Shared CWE-620
CVE-2025-11235Shared CWE-620
CVE-2025-4606Shared CWE-620
CVE-2026-30458Shared CWE-620
CVE-2024-45647Shared CWE-620
CVE-2025-9286Shared CWE-620
CVE-2024-12860Shared CWE-620
CVE-2025-70082Shared CWE-620

References