Post 02 | Waveshare RS232/485 Gateway: Authentication Bypass via Blank Credentials (CVE-2025-63362)
1. Executive Summary
A vulnerability in the Waveshare RS232/485 TO WIFI ETH (B) gateway allows authentication bypass when the administrator username and password are configured as blank values, disabling authentication entirely and granting unrestricted administrative access.
- CVE ID: CVE-2025-63362
- CVSS v3.1 Base Score: 9.8 (Critical) — AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- CVSS v4.0 Base Score: 9.3 (Critical) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H
- Attention: Exploitable remotely / no authentication required
- Vendor: Waveshare Electronics
- Equipment: Waveshare RS232/485 TO WIFI ETH (B)
- Vulnerability: Authentication Bypass via Blank Administrator Credentials
- CSAF Document: View CSAF
2. Risk Evaluation
The vulnerability presents severe risk because:
- Any remote attacker can obtain full administrative control with no credentials.
- Configuration tampering may disrupt serial routing and industrial communication workflows.
- Unauthorized users can modify key network and Wi-Fi settings, enabling deeper compromise.
- Operational visibility and safety may be affected in ICS/IIoT environments.
3. Technical Details
3.1 Affected Products
- Waveshare RS232/485 TO WIFI ETH (B)
- Firmware Version: V3.1.1.0
- Hardware Version: 4.3.2.1
- Web Interface: V7.04T.07.002880.0301
3.2 Vulnerability Description
The endpoint /EN/do_cmd.html accepts blank administrator credential fields:
admuser— administrator usernameSYSPS— administrator password
The device performs no validation to ensure the parameters are non-empty.
Example vulnerable request:
1
2
POST /EN/do_cmd.html
admuser=&SYSPS=
When both values are blank:
- The device stores the empty credentials.
- The authentication routine treats empty strings as valid.
- All authentication on web and Telnet interfaces becomes bypassed.
This creates a universal access condition for any remote attacker.
3.3 Attack Scenarios
-
Scenario 1 — Remote unauthenticated takeover
An attacker sends a request setting blank credentials and then logs in without a password.
-
Scenario 2 — Opportunistic exploitation
If a legitimate user misconfigures the device (leaving credentials blank), the attacker simply browses to the web UI and gains full access.
-
Scenario 3 — Telnet control
Once bypassed, Telnet access becomes unrestricted if enabled, allowing manipulation of low-level device operations.
4. Mitigations
4.1 User Recommendations
- Ensure administrator credentials are never blank
- Restrict management access via firewalls and VLAN segmentation
- Disable Telnet if not required
- Follow CISA ICS security guidance: https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01
4.2 Vendor Recommendations
- Enforce mandatory non-empty credentials
- Block saving empty configuration values
- Implement password complexity requirements
5. Disclosure Timeline
- 16 Sep 2025 — Initial report submitted
- 23 Sep 2025 — Vendor acknowledgment
- 23–27 Sep 2025 — Researcher remediation request; no timeline provided
- 27 Sep 2025 — Escalation notification
- 29 Sep 2025 — Submitted to MITRE
- 10 Nov 2025 — CVE reserved
- 11 Nov 2025 — Public disclosure
6. Background
This gateway is used in:
- Industrial automation (PLC/RTU/SCADA serial bridges)
- IIoT telemetry & sensor networks
- Remote monitoring systems
- Embedded development and maker ecosystems
7. Researcher
Abhishek Pandey
Payatu Security Consulting Pvt. Ltd.