Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14090: SQL Injection in AMTT Hotel Broadband Operation System

0
Medium
VulnerabilityCVE-2025-14090cvecve-2025-14090
Published: Fri Dec 05 2025 (12/05/2025, 15:32:08 UTC)
Source: CVE Database V5
Vendor/Project: AMTT
Product: Hotel Broadband Operation System

Description

A security flaw has been discovered in AMTT Hotel Broadband Operation System 1.0. This affects an unknown part of the file /manager/card/cardmake_down.php. Performing manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/12/2025, 16:32:31 UTC

Technical Analysis

CVE-2025-14090 identifies a SQL injection vulnerability in version 1.0 of the AMTT Hotel Broadband Operation System, specifically within the /manager/card/cardmake_down.php script. The vulnerability arises from improper sanitization of the 'ID' parameter, which an attacker can manipulate to inject arbitrary SQL commands. This flaw allows remote exploitation without user interaction but requires high privileges, indicating that an attacker must already have some level of authenticated access to the system. The injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the backend database. The vendor was notified early but has not issued any patches or advisories, and no known exploits are currently active in the wild. The CVSS 4.0 vector indicates network attack vector, low complexity, no user interaction, and no privileges required for attack execution, but the presence of 'PR:H' (privileges required: high) suggests that exploitation is limited to users with elevated access. The vulnerability affects a critical component managing broadband access cards in hotel environments, potentially allowing attackers to manipulate user access or disrupt service. Given the public disclosure and lack of vendor response, the risk of exploitation may increase over time.

Potential Impact

For European organizations, particularly those in the hospitality sector using AMTT Hotel Broadband Operation System 1.0, this vulnerability poses a risk to the confidentiality and integrity of customer and operational data. Attackers with high privileges could exploit the SQL injection to extract sensitive information, alter broadband access controls, or disrupt network services, leading to service outages or data breaches. This could result in reputational damage, regulatory penalties under GDPR for data exposure, and operational downtime. The impact is heightened in large hotel chains or resorts where broadband access management is critical for guest services. Additionally, compromised broadband systems could serve as pivot points for further network intrusion. The lack of vendor patches increases exposure duration, necessitating proactive defensive measures. While the vulnerability requires high privileges, insider threats or compromised credentials could facilitate exploitation, making internal security controls vital.

Mitigation Recommendations

1. Implement strict input validation and parameterized queries in the affected application component to prevent SQL injection. 2. Restrict access to the /manager/card/cardmake_down.php endpoint using network segmentation and firewall rules, limiting it to trusted administrative networks only. 3. Enforce strong authentication and role-based access controls to minimize the number of users with high privileges. 4. Monitor logs and network traffic for unusual queries or access patterns indicative of SQL injection attempts. 5. Conduct regular security audits and penetration testing focused on web application vulnerabilities. 6. If possible, isolate the broadband operation system from other critical infrastructure to contain potential breaches. 7. Engage with the vendor for patch development or consider alternative solutions if remediation is delayed. 8. Educate internal staff about the risks of privilege misuse and enforce strict credential management policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T08:48:41.294Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6932fe10f88dbe026cf26f4f

Added to database: 12/5/2025, 3:45:20 PM

Last enriched: 12/12/2025, 4:32:31 PM

Last updated: 1/20/2026, 6:25:11 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats