CVE-2025-63362
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-15
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| waveshare | rs232\/485_to_wifi_eth_\(b\)_firmware | 3.1.1.0 |
| waveshare | rs232\/485_to_wifi_eth_\(b\) | 4.3.2.1 |
| waveshare | rs232/485_to_wifi_eth_(b)_firmware | 3.1.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-620 | When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0 allows attackers to set the Administrator username and password to blank values. This effectively bypasses the authentication mechanism, enabling unauthorized access to the device.
How can this vulnerability impact me? :
By allowing attackers to bypass authentication, this vulnerability can lead to unauthorized access to the device. This could result in attackers gaining control over the device, potentially leading to data interception, manipulation, or disruption of network communications.