{"vulnerability": "cve-2025-25037", "sightings": [{"uuid": "56c87348-5fd2-4138-af0c-28b9d2d844e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19263", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25037\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: An information disclosure vulnerability exists in Aquatronica Controller System firmware versions &lt;= 5.1.6 and web interface versions &lt;= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters.\n\ud83d\udccf Published: 2025-06-20T18:35:19.243Z\n\ud83d\udccf Modified: 2025-06-23T20:33:15.219Z\n\ud83d\udd17 References:\n1. https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5824.php\n2. https://www.exploit-db.com/exploits/52028\n3. https://fortiguard.fortinet.com/encyclopedia/ips/56008\n4. https://www.aquatronica.com\n5. https://vulncheck.com/advisories/aquatronica-controller-system-credential-leak", "creation_timestamp": "2025-06-23T20:47:21.000000Z"}, {"uuid": "ddb66748-1100-49b5-9532-a34ae5d2939b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ls5h7ngo6k2u", "content": "", "creation_timestamp": "2025-06-21T21:02:18.808277Z"}, {"uuid": "699c596e-42e0-4efe-ac09-5f417918f0b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-24)", "content": "", "creation_timestamp": "2026-03-24T00:00:00.000000Z"}, {"uuid": "81783674-712a-45fd-ac5b-aefd049d6294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-22)", "content": "", "creation_timestamp": "2026-04-22T00:00:00.000000Z"}, {"uuid": "8d962d99-4518-40c4-9f5a-a34e1b712916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ls324ddez72m", "content": "", "creation_timestamp": "2025-06-20T22:02:28.760436Z"}]}