Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 15 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Waveshare rs232\/485 To Wifi Eth \(b\)
Waveshare rs232\/485 To Wifi Eth \(b\) Firmware |
|
| CPEs | cpe:2.3:h:waveshare:rs232\/485_to_wifi_eth_\(b\):4.3.2.1:*:*:*:*:*:*:* cpe:2.3:o:waveshare:rs232\/485_to_wifi_eth_\(b\)_firmware:3.1.1.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Waveshare rs232\/485 To Wifi Eth \(b\)
Waveshare rs232\/485 To Wifi Eth \(b\) Firmware |
Mon, 08 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-620 | |
| Metrics |
cvssV3_1
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Waveshare
Waveshare rs232/485 To Wifi Eth B |
|
| Vendors & Products |
Waveshare
Waveshare rs232/485 To Wifi Eth B |
Thu, 04 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-08T15:35:56.921Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63362
Updated: 2025-12-08T15:34:36.371Z
Status : Analyzed
Published: 2025-12-04T19:16:04.973
Modified: 2025-12-15T15:37:07.627
Link: CVE-2025-63362
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:52:06Z