Skip to main content

CVE-2025-10326: OS Command Injection in MiczFlor RPi-Jukebox-RFID

Medium
VulnerabilityCVE-2025-10326cvecve-2025-10326
Published: Fri Sep 12 2025 (09/12/2025, 20:32:05 UTC)
Source: CVE Database V5
Vendor/Project: MiczFlor
Product: RPi-Jukebox-RFID

Description

A security flaw has been discovered in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected is an unknown function of the file /htdocs/api/playlist/single.php. Performing manipulation of the argument playlist results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/12/2025, 23:17:33 UTC

Technical Analysis

CVE-2025-10326 is a security vulnerability identified in the MiczFlor RPi-Jukebox-RFID software, specifically affecting all versions up to and including 2.8.0. The vulnerability exists in an unspecified function within the /htdocs/api/playlist/single.php file, where the 'playlist' argument is susceptible to OS command injection. This means that an attacker can remotely manipulate the 'playlist' parameter to execute arbitrary operating system commands on the underlying device running the vulnerable software. The attack vector is remote and does not require user interaction or prior authentication, increasing the risk of exploitation. The vendor was notified early but has not responded or issued a patch, and while no known exploits are currently observed in the wild, a public exploit has been released, raising the likelihood of future attacks. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low attack complexity and no required privileges or user interaction. The vulnerability affects a niche product used primarily on Raspberry Pi devices for RFID-based jukebox functionality, which may be deployed in personal, educational, or small business environments. The lack of vendor response and patch availability increases the urgency for users to implement mitigations or consider alternative solutions.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment scale and criticality of the RPi-Jukebox-RFID system. While this software is specialized and likely not widely used in large enterprises, small businesses, educational institutions, or hobbyist environments in Europe that utilize Raspberry Pi-based jukebox systems could be at risk. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, data leakage, or disruption of services. In environments where these devices are connected to internal networks, attackers could leverage compromised devices as pivot points for lateral movement or further attacks. The medium severity rating indicates a moderate risk, but the absence of authentication and user interaction requirements means exploitation could be straightforward. Additionally, the vendor's lack of response and absence of patches increase the risk exposure. European organizations with IoT or embedded device management programs should be aware of this threat to prevent potential compromise.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate practical steps to mitigate the risk: 1) Isolate affected RPi-Jukebox-RFID devices on segmented network zones with strict firewall rules to limit inbound and outbound traffic. 2) Disable or restrict access to the vulnerable API endpoint (/htdocs/api/playlist/single.php) if feasible, or implement web application firewalls (WAFs) with custom rules to detect and block command injection patterns targeting the 'playlist' parameter. 3) Monitor network and device logs for unusual command execution or suspicious activity indicative of exploitation attempts. 4) Where possible, replace or upgrade to alternative jukebox solutions that do not exhibit this vulnerability. 5) Employ host-based intrusion detection systems (HIDS) on Raspberry Pi devices to detect unauthorized command execution. 6) Regularly review and update device configurations to minimize exposed services and enforce the principle of least privilege. 7) Maintain awareness of vendor communications for any future patches or advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T08:34:24.709Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c4a9e26da8ad0abf36f280

Added to database: 9/12/2025, 11:16:50 PM

Last enriched: 9/12/2025, 11:17:33 PM

Last updated: 9/13/2025, 12:52:27 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats