Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63361: n/a

0
Medium
VulnerabilityCVE-2025-63361cvecve-2025-63361
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 was discovered to render the Administrator password in plaintext.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:01:56 UTC

Technical Analysis

CVE-2025-63361 is a vulnerability identified in the Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway, specifically in Firmware version 3.1.1.0 with hardware version 4.3.2.1 and webpage version V7.04T.07.002880.0301. The vulnerability stems from the device rendering the administrator password in plaintext within its web management interface. This exposure violates secure credential handling best practices (CWE-522: Insufficiently Protected Credentials), allowing an attacker who gains access to the web interface to view the administrator password directly. The CVSS 3.1 vector indicates the attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires privileges (PR:L) and user interaction (UI:R). The impact is primarily on confidentiality (C:H), with no direct effect on integrity or availability. This means that while the device’s operation is not disrupted, unauthorized disclosure of credentials could lead to further compromise. No patches or firmware updates are currently listed, and no known exploits have been reported in the wild. The vulnerability is significant in environments where these gateways are deployed to bridge serial devices to Ethernet or Wi-Fi networks, often in industrial control systems or IoT setups. Attackers with network access and some user privileges could leverage this flaw to escalate privileges or move laterally within a network by capturing administrator credentials in plaintext from the web interface.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors that utilize Waveshare RS232/485 to Ethernet/Wi-Fi gateways, this vulnerability poses a risk of credential compromise. Exposure of the administrator password can lead to unauthorized configuration changes, network reconnaissance, or pivoting attacks within internal networks. Given the device’s role as a bridge between serial and network communications, compromise could facilitate attacks on connected serial devices or broader network segments. Confidentiality breaches may result in intellectual property theft or operational disruption if attackers gain control over device settings. While the vulnerability does not directly affect device availability or integrity, the indirect consequences of unauthorized access could be severe. The requirement for some privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments with weak network segmentation or insufficient access controls.

Mitigation Recommendations

European organizations should implement strict network segmentation to isolate management interfaces of Waveshare gateways from general network access, limiting exposure to trusted administrators only. Employ strong authentication mechanisms and consider multi-factor authentication if supported by the device or surrounding infrastructure. Monitor network traffic and device logs for unusual access patterns or repeated login attempts. Since no official patches are currently available, organizations should engage with Waveshare support to obtain firmware updates or advisories. Where possible, replace vulnerable devices with updated models or alternative solutions that follow secure credential handling practices. Additionally, disable or restrict web interface access over untrusted networks and use VPNs or secure tunnels for remote management. Conduct regular security audits of IoT and industrial devices to identify similar credential exposure risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931d6d1e9ea8245265fa5e6

Added to database: 12/4/2025, 6:45:37 PM

Last enriched: 12/11/2025, 10:01:56 PM

Last updated: 1/19/2026, 7:56:24 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats