Aquatronica Control System 5.1.6 Passwords Leak Vulnerability

Title: Aquatronica Control System 5.1.6 Passwords Leak Vulnerability
Advisory ID: ZSL-2024-5824
Type: Local/Remote
Impact: Security Bypass, Privilege Escalation, System Access, DoS, Exposure of System Information, Exposure of Sensitive Information, Manipulation of Data
Risk: (5/5)
Release Date: 30.05.2024
Summary
Aquatronica's electronic AQUARIUM CONTROLLER is easy to use, allowing you to control all the electrical devices in an aquarium and to monitor all their parameters; it can be used for soft water aquariums, salt water aquariums or both simultaneously.
Description
The tcp.php endpoint on the Aquatronica controller is exposed to unauthenticated attackers over the network. This vulnerability allows remote attackers to send a POST request which can reveal sensitive configuration information, including plaintext passwords. This can lead to unauthorized access and control over the aquarium controller, compromising its security and potentially allowing attackers to manipulate its settings.
Vendor
Aquatronica s.r.l. - https://www.aquatronica.com
Affected Version
Firmware: 5.1.6
Web: 2.0
Tested On
Apache/2.0.54 (Unix)
PHP/5.4.17
Vendor Status
[04.05.2024] Vulnerability discovered.
[07.05.2024] Vendor contacted.
[29.05.2024] No response from the vendor.
[30.05.2024] Public security advisory released.
PoC
aqua.py
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://packetstormsecurity.com/files/178871/Aquatronica-Control-System-5.1.6-Password-Disclosure.html
[2] https://www.exploit-db.com/exploits/52028
[3] https://cxsecurity.com/issue/WLB-2024060024
Changelog
[30.05.2024] - Initial release
[01.07.2024] - Added reference [1], [2] and [3]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk