Technical Advisory

Through sharp, technical and insightful analysis, the Payatu Team is constantly on the lookout for vulnerabilities and threats. This section exhibits a few of our findings.

Technical Advisory

Through sharp, technical and insightful analysis, the Payatu Team is constantly on the lookout for vulnerabilities and threats. This section exhibits a few of our findings.

Administrator Password Displayed in Plaintext on Waveshare RS232/485 TO WIFI ETH (B) 

Vulnerability

Insufficiently Protected Credentials / UI Exposure of Secrets: Web Management Interface (M2M Web Server) Displays Administrator Password in Plaintext Input Field. 

Vulnerability Description

The web interface of the Waveshare RS232/485 TO WIFI ETH (B) Serial-to-Ethernet/Wi-Fi Gateway (Firmware V3.1.1.0, HW 4.3.2.1, Webpage V7.04T.07.002880.0301) displays the administrator password in plaintext. 

The password field (SYSPS) is rendered as <input type=”text”>, allowing anyone with web access or developer-tool visibility to read credentials 

Impact

Exposes valid administrator credentials, enabling device compromise. 

CVE-ID

CVE-2025-63361 

Vendor

Waveshare Electronics 

Product

Product Name Affected Version 
RS232/485 TO WIFI ETH (B) Firmware V3.1.1.0 (HW 4.3.2.1, Webpage V7.04T.07.002880.0301) 

CWE 

CWE-522 – Insufficiently Protected Credentials 
CWE-256 – Unprotected Storage of Credentials 

CVSS v3.1 Scoring 

  • Base Score: 6.5 (Medium) 
  • Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Disclosure Timeline

16 Sep 2025 — Initial report sent via Waveshare support portal with full disclosure report. 

  • 23 Sep 2025 — Vendor acknowledged receipt. 
  • 23 Sep 2025 — Researcher requested remediation timeline, CVD process, and CVE coordination details. 
  • 24 Sep 2025 — Vendor replied: “Information received; feedback will be taken into account in future research.” 
  • 24 Sep 2025 — Researcher requested confirmation on CVD process and timeline. 
  • 27 Sep 2025 — Vendor responded: “No specific timeline can be provided; security feedback will be considered in subsequent products.” 
  • 27 Sep 2025 — Researcher informed vendor case would be reported to MITRE for CVE assignment. 
  • 29 Sep 2025 — Reported to MITRE for CVE assignment. 
  • 10 Nov 2025 — CVE ID reserved. 
  • 11 Nov 2025 — Public advisory released by Payatu. 

Credits

Abhishek Pandey – Payatu Security Consulting Pvt. Ltd. 

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by