CVE-2025-25037
BaseFortify
Publication date: 2025-06-20
Last updated on: 2025-06-23
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-25037 is an information disclosure vulnerability in the Aquatronica Controller System firmware (versions <= 5.1.6) and web interface (versions <= 2.0). The vulnerability exists because the tcp.php endpoint does not restrict unauthenticated access, allowing remote attackers to send crafted POST requests that retrieve sensitive configuration data, including plaintext administrative credentials. This flaw enables attackers to gain unauthorized access to the system and potentially fully compromise it by manipulating connected devices and aquarium parameters. [1, 2, 3]
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to severe impacts including unauthorized disclosure of sensitive information such as plaintext administrative credentials, unauthorized access to the aquarium controller system, privilege escalation, security bypass, manipulation of device settings, and potential denial of service. Ultimately, attackers can fully compromise the system and control connected aquarium devices and parameters. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending a crafted POST request to the tcp.php endpoint of the Aquatronica Controller System and checking for sensitive configuration data in the response. Specifically, sending a POST request with parameters `function_id=TCP_XML_REQUEST` and `command=WS_GET_NETWORK_CFG` can reveal plaintext administrative credentials if the system is vulnerable. A proof-of-concept Python script (aqua.py) exists that automates this detection by sending the request and extracting credentials using regex. For manual testing, you can use curl as follows: `curl -X POST -d "function_id=TCP_XML_REQUEST&command=WS_GET_NETWORK_CFG" http://<target-ip>/tcp.php` and inspect the response for sensitive data. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the tcp.php endpoint to trusted users or networks, such as by implementing network-level access controls or firewall rules to block unauthenticated external access. Since the vulnerability allows unauthenticated remote access, isolating the device from untrusted networks can reduce risk. Additionally, monitor for unusual POST requests to tcp.php and consider disabling or restricting the vulnerable web interface if possible until a vendor patch or update is available. [2]