PHP CVE-2025-25037

| EUVD-2025-18781 CRITICAL
Information Exposure (CWE-200)
2025-06-20 [email protected]
9.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

4
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18781
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
PoC Detected
Jun 23, 2025 - 20:16 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 19:15 nvd
CRITICAL 9.3

DescriptionNVD

An information disclosure vulnerability exists in Aquatronica Controller System firmware versions <= 5.1.6 and web interface versions <= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters.

AnalysisAI

CVE-2025-25037 is a critical authentication bypass vulnerability in Aquatronica Controller System that exposes an unauthenticated tcp.php endpoint, allowing remote attackers to retrieve plaintext administrative credentials and sensitive system configuration data without authentication. Affected versions include firmware ≤5.1.6 and web interface ≤2.0. Successful exploitation enables complete system compromise, including unauthorized control of connected aquarium devices and manipulation of critical parameters, representing a direct path to full administrative access with no user interaction required.

Technical ContextAI

The vulnerability exists in the tcp.php endpoint of Aquatronica's web-based controller management interface. The root cause is CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), stemming from inadequate access control mechanisms on a sensitive administrative endpoint. The endpoint fails to implement proper authentication validation before processing POST requests that query system configuration—specifically those containing administrative credentials. This is a classic authentication bypass rather than authorization bypass: the endpoint does not check whether a user is authenticated at all before granting access to sensitive data structures. The Aquatronica Controller System is a networked IoT device for aquarium management, typically accessible via HTTP/HTTPS interfaces. The tcp.php endpoint appears to be a backend service handler for device communication, likely intended for authenticated management stations but exposed without protective middleware.

RemediationAI

Immediate actions: (1) Upgrade Aquatronica Controller System firmware to version >5.1.6 (latest available stable release); (2) Upgrade web interface to version >2.0; (3) If immediate patching is not feasible, implement network-level mitigations: restrict HTTP/HTTPS access to the Aquatronica device to trusted management networks only using firewall rules, disable external Internet exposure, and implement VPN/bastion host access patterns. (4) Audit system logs for unauthorized tcp.php endpoint access (look for POST requests to /tcp.php from unexpected sources). (5) Reset all administrative credentials after patching, as any unpatched system should be assumed compromised. (6) Monitor Aquatronica's vendor advisory page and GitHub security advisories for patch release dates. Contact Aquatronica support ([email protected] or equivalent) for enterprise patch availability and deployment guidance if custom configurations exist.

Share

CVE-2025-25037 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy