Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63363: n/a

0
High
VulnerabilityCVE-2025-63363cvecve-2025-63363
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A lack of Management Frame Protection in Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to execute de-authentication attacks, allowing crafted deauthentication and disassociation frames to be broadcast without authentication or encryption.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:01:43 UTC

Technical Analysis

CVE-2025-63363 identifies a vulnerability in the Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway, specifically in Firmware version 3.1.1.0 with hardware version 4.3.2.1 and Webpage version V7.04T.07.002880.0301. The core issue is the lack of Management Frame Protection (MFP), a security feature designed to authenticate and encrypt management frames in wireless communications. Without MFP, attackers can craft and broadcast deauthentication and disassociation frames to the wireless network without needing authentication or encryption. This allows them to forcibly disconnect legitimate wireless clients from the network, effectively causing a denial-of-service (DoS) attack. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it straightforward for attackers to leverage. The CVSS v3.1 score of 7.5 reflects a high severity primarily due to the impact on availability (A:H) while confidentiality and integrity remain unaffected (C:N/I:N). The weakness aligns with CWE-284 (Improper Access Control) and CWE-300 (Channel Accessible by Non-Endpoint), indicating flaws in access control and communication channel security. No patches or exploits are currently known, but the vulnerability poses a risk to environments relying on these gateways for serial-to-Ethernet/Wi-Fi connectivity, especially in industrial control systems or IoT deployments where network availability is critical.

Potential Impact

For European organizations, the primary impact of CVE-2025-63363 is the potential for denial-of-service attacks that disrupt wireless connectivity of critical serial-to-Ethernet/Wi-Fi gateways. These devices often serve as bridges between legacy serial equipment and modern network infrastructure, commonly used in industrial automation, manufacturing, and building management systems. Disruptions could halt production lines, degrade operational efficiency, or impair monitoring and control systems. Since the attack does not compromise confidentiality or integrity, the risk is focused on availability, which can still have severe operational and financial consequences. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with wireless networks accessible to potential attackers. Additionally, the lack of known patches means organizations must rely on network-level mitigations until vendor fixes are released. This vulnerability could also be leveraged as part of a broader attack chain targeting critical infrastructure, amplifying its impact.

Mitigation Recommendations

1. Monitor network traffic for unusual spikes in deauthentication or disassociation frames using wireless intrusion detection systems (WIDS) or network monitoring tools. 2. Segment networks to isolate vulnerable gateways from general user access and limit exposure to untrusted wireless clients. 3. Implement strong wireless network security policies, including enabling Management Frame Protection (MFP) if supported by other network devices to reduce attack surface. 4. Engage with Waveshare or authorized vendors to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. Where possible, replace or supplement vulnerable gateways with devices that support robust management frame protection and modern security standards. 6. Conduct regular security assessments of wireless infrastructure to identify and remediate similar vulnerabilities. 7. Employ physical security controls to restrict unauthorized access to wireless network areas, reducing the risk of local exploitation. 8. Prepare incident response plans specifically addressing wireless denial-of-service scenarios to minimize operational downtime.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931cb48911f2f20c4b34cb2

Added to database: 12/4/2025, 5:56:24 PM

Last enriched: 12/11/2025, 10:01:43 PM

Last updated: 1/19/2026, 9:55:57 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats