CVE-2025-10328: OS Command Injection in MiczFlor RPi-Jukebox-RFID
A security vulnerability has been detected in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this issue is some unknown functionality of the file /htdocs/api/playlist/playsinglefile.php. The manipulation of the argument File leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10328 is a security vulnerability identified in the MiczFlor RPi-Jukebox-RFID software, versions up to and including 2.8.0. This software is designed to run on Raspberry Pi devices and provides a jukebox functionality controlled via RFID tags. The vulnerability exists within the /htdocs/api/playlist/playsinglefile.php file, specifically in the handling of the 'File' argument. Improper sanitization or validation of this argument allows an attacker to perform OS command injection. This means that an attacker can craft a malicious input for the 'File' parameter that gets executed as a system command on the underlying operating system. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing the risk of unauthorized access or control. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified but has not responded or issued a patch, and no known exploits are currently observed in the wild. This vulnerability could allow attackers to execute arbitrary commands on affected Raspberry Pi devices running the vulnerable software, potentially leading to system compromise, data leakage, or disruption of service.
Potential Impact
For European organizations using MiczFlor RPi-Jukebox-RFID, particularly in environments where Raspberry Pi devices are deployed for media playback or IoT applications, this vulnerability presents a tangible risk. Exploitation could lead to unauthorized command execution, enabling attackers to manipulate or disrupt services, access sensitive data, or pivot within internal networks. Given the low complexity and remote exploitability without authentication, attackers could leverage this vulnerability to establish persistent footholds or launch further attacks. While the software is niche, organizations in sectors such as education, retail, hospitality, or cultural institutions that use Raspberry Pi-based jukebox systems could be affected. The lack of vendor response and patch availability increases exposure time. Additionally, compromised devices could be used as entry points into broader network infrastructure, impacting confidentiality, integrity, and availability of organizational resources.
Mitigation Recommendations
1. Immediate mitigation should include isolating Raspberry Pi devices running RPi-Jukebox-RFID from critical network segments to limit potential lateral movement. 2. Implement network-level access controls and firewall rules to restrict inbound traffic to the affected devices, allowing only trusted sources. 3. Monitor network traffic and system logs on these devices for unusual command execution patterns or unexpected connections. 4. Where possible, disable or restrict API access to the vulnerable playsinglefile.php endpoint until a patch is available. 5. Consider deploying application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect and block command injection attempts targeting the 'File' parameter. 6. If feasible, review and sanitize inputs at the application level by modifying the source code to validate and escape user inputs properly, or apply community-sourced patches if available. 7. Maintain an inventory of all Raspberry Pi devices running this software to ensure comprehensive coverage. 8. Stay alert for vendor updates or community patches and apply them promptly once released.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-10328: OS Command Injection in MiczFlor RPi-Jukebox-RFID
Description
A security vulnerability has been detected in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this issue is some unknown functionality of the file /htdocs/api/playlist/playsinglefile.php. The manipulation of the argument File leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10328 is a security vulnerability identified in the MiczFlor RPi-Jukebox-RFID software, versions up to and including 2.8.0. This software is designed to run on Raspberry Pi devices and provides a jukebox functionality controlled via RFID tags. The vulnerability exists within the /htdocs/api/playlist/playsinglefile.php file, specifically in the handling of the 'File' argument. Improper sanitization or validation of this argument allows an attacker to perform OS command injection. This means that an attacker can craft a malicious input for the 'File' parameter that gets executed as a system command on the underlying operating system. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing the risk of unauthorized access or control. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified but has not responded or issued a patch, and no known exploits are currently observed in the wild. This vulnerability could allow attackers to execute arbitrary commands on affected Raspberry Pi devices running the vulnerable software, potentially leading to system compromise, data leakage, or disruption of service.
Potential Impact
For European organizations using MiczFlor RPi-Jukebox-RFID, particularly in environments where Raspberry Pi devices are deployed for media playback or IoT applications, this vulnerability presents a tangible risk. Exploitation could lead to unauthorized command execution, enabling attackers to manipulate or disrupt services, access sensitive data, or pivot within internal networks. Given the low complexity and remote exploitability without authentication, attackers could leverage this vulnerability to establish persistent footholds or launch further attacks. While the software is niche, organizations in sectors such as education, retail, hospitality, or cultural institutions that use Raspberry Pi-based jukebox systems could be affected. The lack of vendor response and patch availability increases exposure time. Additionally, compromised devices could be used as entry points into broader network infrastructure, impacting confidentiality, integrity, and availability of organizational resources.
Mitigation Recommendations
1. Immediate mitigation should include isolating Raspberry Pi devices running RPi-Jukebox-RFID from critical network segments to limit potential lateral movement. 2. Implement network-level access controls and firewall rules to restrict inbound traffic to the affected devices, allowing only trusted sources. 3. Monitor network traffic and system logs on these devices for unusual command execution patterns or unexpected connections. 4. Where possible, disable or restrict API access to the vulnerable playsinglefile.php endpoint until a patch is available. 5. Consider deploying application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect and block command injection attempts targeting the 'File' parameter. 6. If feasible, review and sanitize inputs at the application level by modifying the source code to validate and escape user inputs properly, or apply community-sourced patches if available. 7. Maintain an inventory of all Raspberry Pi devices running this software to ensure comprehensive coverage. 8. Stay alert for vendor updates or community patches and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T08:34:31.071Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c49285e7ced5bb5fd749ba
Added to database: 9/12/2025, 9:37:09 PM
Last enriched: 9/21/2025, 12:41:25 AM
Last updated: 10/30/2025, 5:02:02 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
CriticalCVE-2024-2961: CWE-787 Out-of-bounds Write in The GNU C Library glibc
HighCVE-2025-12475: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy Companion
MediumCVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.