CVE-2025-63361

5.7 MEDIUM

📋 TL;DR

This vulnerability exposes the administrator password in plaintext on the web interface of Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway devices. Attackers with network access can view the password, potentially gaining administrative control. Organizations using this specific firmware version are affected.

💻 Affected Systems

Products:
  • Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway
Versions: Firmware V3.1.1.0 with HW 4.3.2.1 and Webpage V7.04T.07.002880.0301
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only this specific firmware/hardware/webpage version combination is confirmed affected. Other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative takeover of the gateway device, allowing attackers to reconfigure serial-to-network communications, intercept or modify industrial data, or use the device as a pivot point into operational technology networks.

🟠

Likely Case

Unauthorized administrative access leading to device configuration changes, network disruption, or data interception from connected serial devices.

🟢

If Mitigated

Limited impact if device is isolated in a segmented network with strict access controls and monitoring.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can easily discover and exploit this vulnerability to gain administrative access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems on the same network segment can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only web browser access to view the plaintext password. No special tools or authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Check vendor website for firmware updates and apply if available.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the device in a separate VLAN or network segment with strict access controls.

Access Control Lists

all

Implement firewall rules to restrict web interface access to authorized IP addresses only.

🧯 If You Can't Patch

  • Change administrator password immediately and monitor for unauthorized access attempts.
  • Disable web interface if not required, or restrict to HTTPS-only access with strong authentication.

🔍 How to Verify

Check if Vulnerable:

Access the device web interface and check if administrator password is displayed in plaintext on any configuration page.

Check Version:

Check device web interface status page for firmware version: V3.1.1.0, HW 4.3.2.1, Webpage V7.04T.07.002880.0301

Verify Fix Applied:

Verify that password fields are masked or encrypted in the web interface after any firmware update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from unusual IP
  • Configuration changes from unauthorized IP addresses

Network Indicators:

  • HTTP requests to device web interface from unauthorized IPs
  • Unusual traffic patterns from the gateway device

SIEM Query:

source_ip IN (unauthorized_ips) AND destination_port=80 AND http_user_agent CONTAINS 'Mozilla' AND destination_ip=gateway_ip

🔗 References

📤 Share & Export