CVE-2025-14090: SQL Injection in AMTT Hotel Broadband Operation System
A security flaw has been discovered in AMTT Hotel Broadband Operation System 1.0. This affects an unknown part of the file /manager/card/cardmake_down.php. Performing manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14090 identifies a SQL injection vulnerability in version 1.0 of the AMTT Hotel Broadband Operation System, specifically within the /manager/card/cardmake_down.php script. The vulnerability arises from improper sanitization of the 'ID' parameter, which an attacker can manipulate to inject arbitrary SQL commands. This flaw allows remote exploitation without user interaction but requires high privileges, indicating that an attacker must already have some level of authenticated access to the system. The injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the backend database. The vendor was notified early but has not issued any patches or advisories, and no known exploits are currently active in the wild. The CVSS 4.0 vector indicates network attack vector, low complexity, no user interaction, and no privileges required for attack execution, but the presence of 'PR:H' (privileges required: high) suggests that exploitation is limited to users with elevated access. The vulnerability affects a critical component managing broadband access cards in hotel environments, potentially allowing attackers to manipulate user access or disrupt service. Given the public disclosure and lack of vendor response, the risk of exploitation may increase over time.
Potential Impact
For European organizations, particularly those in the hospitality sector using AMTT Hotel Broadband Operation System 1.0, this vulnerability poses a risk to the confidentiality and integrity of customer and operational data. Attackers with high privileges could exploit the SQL injection to extract sensitive information, alter broadband access controls, or disrupt network services, leading to service outages or data breaches. This could result in reputational damage, regulatory penalties under GDPR for data exposure, and operational downtime. The impact is heightened in large hotel chains or resorts where broadband access management is critical for guest services. Additionally, compromised broadband systems could serve as pivot points for further network intrusion. The lack of vendor patches increases exposure duration, necessitating proactive defensive measures. While the vulnerability requires high privileges, insider threats or compromised credentials could facilitate exploitation, making internal security controls vital.
Mitigation Recommendations
1. Implement strict input validation and parameterized queries in the affected application component to prevent SQL injection. 2. Restrict access to the /manager/card/cardmake_down.php endpoint using network segmentation and firewall rules, limiting it to trusted administrative networks only. 3. Enforce strong authentication and role-based access controls to minimize the number of users with high privileges. 4. Monitor logs and network traffic for unusual queries or access patterns indicative of SQL injection attempts. 5. Conduct regular security audits and penetration testing focused on web application vulnerabilities. 6. If possible, isolate the broadband operation system from other critical infrastructure to contain potential breaches. 7. Engage with the vendor for patch development or consider alternative solutions if remediation is delayed. 8. Educate internal staff about the risks of privilege misuse and enforce strict credential management policies.
Affected Countries
Spain, Italy, France, Germany, United Kingdom, Netherlands, Portugal, Greece
CVE-2025-14090: SQL Injection in AMTT Hotel Broadband Operation System
Description
A security flaw has been discovered in AMTT Hotel Broadband Operation System 1.0. This affects an unknown part of the file /manager/card/cardmake_down.php. Performing manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14090 identifies a SQL injection vulnerability in version 1.0 of the AMTT Hotel Broadband Operation System, specifically within the /manager/card/cardmake_down.php script. The vulnerability arises from improper sanitization of the 'ID' parameter, which an attacker can manipulate to inject arbitrary SQL commands. This flaw allows remote exploitation without user interaction but requires high privileges, indicating that an attacker must already have some level of authenticated access to the system. The injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the backend database. The vendor was notified early but has not issued any patches or advisories, and no known exploits are currently active in the wild. The CVSS 4.0 vector indicates network attack vector, low complexity, no user interaction, and no privileges required for attack execution, but the presence of 'PR:H' (privileges required: high) suggests that exploitation is limited to users with elevated access. The vulnerability affects a critical component managing broadband access cards in hotel environments, potentially allowing attackers to manipulate user access or disrupt service. Given the public disclosure and lack of vendor response, the risk of exploitation may increase over time.
Potential Impact
For European organizations, particularly those in the hospitality sector using AMTT Hotel Broadband Operation System 1.0, this vulnerability poses a risk to the confidentiality and integrity of customer and operational data. Attackers with high privileges could exploit the SQL injection to extract sensitive information, alter broadband access controls, or disrupt network services, leading to service outages or data breaches. This could result in reputational damage, regulatory penalties under GDPR for data exposure, and operational downtime. The impact is heightened in large hotel chains or resorts where broadband access management is critical for guest services. Additionally, compromised broadband systems could serve as pivot points for further network intrusion. The lack of vendor patches increases exposure duration, necessitating proactive defensive measures. While the vulnerability requires high privileges, insider threats or compromised credentials could facilitate exploitation, making internal security controls vital.
Mitigation Recommendations
1. Implement strict input validation and parameterized queries in the affected application component to prevent SQL injection. 2. Restrict access to the /manager/card/cardmake_down.php endpoint using network segmentation and firewall rules, limiting it to trusted administrative networks only. 3. Enforce strong authentication and role-based access controls to minimize the number of users with high privileges. 4. Monitor logs and network traffic for unusual queries or access patterns indicative of SQL injection attempts. 5. Conduct regular security audits and penetration testing focused on web application vulnerabilities. 6. If possible, isolate the broadband operation system from other critical infrastructure to contain potential breaches. 7. Engage with the vendor for patch development or consider alternative solutions if remediation is delayed. 8. Educate internal staff about the risks of privilege misuse and enforce strict credential management policies.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-05T08:48:41.294Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6932fe10f88dbe026cf26f4f
Added to database: 12/5/2025, 3:45:20 PM
Last enriched: 12/12/2025, 4:32:31 PM
Last updated: 1/20/2026, 6:25:11 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67263: n/a
HighCVE-2025-33231: CWE-427 Uncontrolled Search Path Element in NVIDIA CUDA Toolkit
MediumCVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit
HighCVE-2025-67261: n/a
HighCVE-2025-55423: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.