CVE-2025-51040: n/a
Electrolink FM/DAB/TV Transmitter Web Management System Unauthorized access vulnerability via the /FrameSetCore.html endpoint in Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08, v01.07, and Display v1.4, v1.2.
AI Analysis
Technical Summary
CVE-2025-51040 is a vulnerability identified in the Electrolink FM/DAB/TV Transmitter Web Management System, specifically affecting the Electrolink 500W, 1kW, and 2kW Medium DAB Transmitter Web versions v01.07, v01.08, v01.09, and Display versions v1.2 and v1.4. The vulnerability allows unauthorized access via the /FrameSetCore.html endpoint. This endpoint appears to be part of the web management interface used to control and configure the transmitter devices. Unauthorized access implies that an attacker can bypass authentication or access controls to reach this endpoint, potentially gaining control or viewing sensitive configuration data without proper credentials. Given that these transmitters are used for FM, DAB (Digital Audio Broadcasting), and TV transmission, unauthorized access could lead to manipulation of broadcast parameters, disruption of transmission services, or exposure of sensitive operational data. The vulnerability is notable because it affects multiple versions of the product line, indicating a persistent security flaw in the web management system. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The lack of patch links suggests that a fix may not yet be available or publicly disclosed. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, especially broadcasters and media companies relying on Electrolink transmitters for FM, DAB, and TV services, this vulnerability poses significant risks. Unauthorized access to transmitter management systems could allow attackers to disrupt broadcast services, causing denial of service to listeners and viewers, which can have regulatory, reputational, and financial consequences. Manipulation of broadcast parameters could lead to interference with other spectrum users or violation of licensing agreements. Additionally, attackers could potentially use the compromised devices as pivot points within the network, threatening broader operational technology (OT) and IT infrastructure. Given the critical nature of broadcast infrastructure in Europe for public communication, emergency alerts, and media dissemination, exploitation of this vulnerability could impact public safety and information dissemination. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits post-disclosure.
Mitigation Recommendations
European organizations using Electrolink transmitters should immediately conduct an inventory to identify affected devices and versions. Until patches or official fixes are released, organizations should restrict network access to the web management interfaces, ideally isolating these devices on dedicated management VLANs with strict firewall rules permitting access only from trusted administrative hosts. Implement network segmentation to separate broadcast management systems from general IT networks. Employ strong authentication mechanisms, such as VPNs or multi-factor authentication, for remote access to management interfaces. Monitor network traffic and logs for unusual access patterns to the /FrameSetCore.html endpoint. Engage with Electrolink or authorized vendors to obtain security advisories and patches as they become available. Additionally, consider deploying intrusion detection systems tailored to detect anomalous activity targeting broadcast management systems. Regularly update and audit device firmware and configurations to ensure compliance with security best practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-51040: n/a
Description
Electrolink FM/DAB/TV Transmitter Web Management System Unauthorized access vulnerability via the /FrameSetCore.html endpoint in Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08, v01.07, and Display v1.4, v1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-51040 is a vulnerability identified in the Electrolink FM/DAB/TV Transmitter Web Management System, specifically affecting the Electrolink 500W, 1kW, and 2kW Medium DAB Transmitter Web versions v01.07, v01.08, v01.09, and Display versions v1.2 and v1.4. The vulnerability allows unauthorized access via the /FrameSetCore.html endpoint. This endpoint appears to be part of the web management interface used to control and configure the transmitter devices. Unauthorized access implies that an attacker can bypass authentication or access controls to reach this endpoint, potentially gaining control or viewing sensitive configuration data without proper credentials. Given that these transmitters are used for FM, DAB (Digital Audio Broadcasting), and TV transmission, unauthorized access could lead to manipulation of broadcast parameters, disruption of transmission services, or exposure of sensitive operational data. The vulnerability is notable because it affects multiple versions of the product line, indicating a persistent security flaw in the web management system. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The lack of patch links suggests that a fix may not yet be available or publicly disclosed. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, especially broadcasters and media companies relying on Electrolink transmitters for FM, DAB, and TV services, this vulnerability poses significant risks. Unauthorized access to transmitter management systems could allow attackers to disrupt broadcast services, causing denial of service to listeners and viewers, which can have regulatory, reputational, and financial consequences. Manipulation of broadcast parameters could lead to interference with other spectrum users or violation of licensing agreements. Additionally, attackers could potentially use the compromised devices as pivot points within the network, threatening broader operational technology (OT) and IT infrastructure. Given the critical nature of broadcast infrastructure in Europe for public communication, emergency alerts, and media dissemination, exploitation of this vulnerability could impact public safety and information dissemination. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits post-disclosure.
Mitigation Recommendations
European organizations using Electrolink transmitters should immediately conduct an inventory to identify affected devices and versions. Until patches or official fixes are released, organizations should restrict network access to the web management interfaces, ideally isolating these devices on dedicated management VLANs with strict firewall rules permitting access only from trusted administrative hosts. Implement network segmentation to separate broadcast management systems from general IT networks. Employ strong authentication mechanisms, such as VPNs or multi-factor authentication, for remote access to management interfaces. Monitor network traffic and logs for unusual access patterns to the /FrameSetCore.html endpoint. Engage with Electrolink or authorized vendors to obtain security advisories and patches as they become available. Additionally, consider deploying intrusion detection systems tailored to detect anomalous activity targeting broadcast management systems. Regularly update and audit device firmware and configurations to ensure compliance with security best practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6893678dad5a09ad00f1dae1
Added to database: 8/6/2025, 2:32:45 PM
Last enriched: 8/6/2025, 2:47:48 PM
Last updated: 8/27/2025, 11:41:59 PM
Views: 24
Related Threats
CVE-2025-58355: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in charmbracelet soft-serve
HighCVE-2025-9938: Stack-based Buffer Overflow in D-Link DI-8400
HighCVE-2025-9937: Improper Authorization in elunez eladmin
MediumCVE-2025-9936: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-9935: Command Injection in TOTOLINK N600R
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.