Skip to main content

CVE-2025-51040: n/a

High
VulnerabilityCVE-2025-51040cvecve-2025-51040
Published: Wed Aug 06 2025 (08/06/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Electrolink FM/DAB/TV Transmitter Web Management System Unauthorized access vulnerability via the /FrameSetCore.html endpoint in Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08, v01.07, and Display v1.4, v1.2.

AI-Powered Analysis

AILast updated: 08/06/2025, 14:47:48 UTC

Technical Analysis

CVE-2025-51040 is a vulnerability identified in the Electrolink FM/DAB/TV Transmitter Web Management System, specifically affecting the Electrolink 500W, 1kW, and 2kW Medium DAB Transmitter Web versions v01.07, v01.08, v01.09, and Display versions v1.2 and v1.4. The vulnerability allows unauthorized access via the /FrameSetCore.html endpoint. This endpoint appears to be part of the web management interface used to control and configure the transmitter devices. Unauthorized access implies that an attacker can bypass authentication or access controls to reach this endpoint, potentially gaining control or viewing sensitive configuration data without proper credentials. Given that these transmitters are used for FM, DAB (Digital Audio Broadcasting), and TV transmission, unauthorized access could lead to manipulation of broadcast parameters, disruption of transmission services, or exposure of sensitive operational data. The vulnerability is notable because it affects multiple versions of the product line, indicating a persistent security flaw in the web management system. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The lack of patch links suggests that a fix may not yet be available or publicly disclosed. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially broadcasters and media companies relying on Electrolink transmitters for FM, DAB, and TV services, this vulnerability poses significant risks. Unauthorized access to transmitter management systems could allow attackers to disrupt broadcast services, causing denial of service to listeners and viewers, which can have regulatory, reputational, and financial consequences. Manipulation of broadcast parameters could lead to interference with other spectrum users or violation of licensing agreements. Additionally, attackers could potentially use the compromised devices as pivot points within the network, threatening broader operational technology (OT) and IT infrastructure. Given the critical nature of broadcast infrastructure in Europe for public communication, emergency alerts, and media dissemination, exploitation of this vulnerability could impact public safety and information dissemination. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits post-disclosure.

Mitigation Recommendations

European organizations using Electrolink transmitters should immediately conduct an inventory to identify affected devices and versions. Until patches or official fixes are released, organizations should restrict network access to the web management interfaces, ideally isolating these devices on dedicated management VLANs with strict firewall rules permitting access only from trusted administrative hosts. Implement network segmentation to separate broadcast management systems from general IT networks. Employ strong authentication mechanisms, such as VPNs or multi-factor authentication, for remote access to management interfaces. Monitor network traffic and logs for unusual access patterns to the /FrameSetCore.html endpoint. Engage with Electrolink or authorized vendors to obtain security advisories and patches as they become available. Additionally, consider deploying intrusion detection systems tailored to detect anomalous activity targeting broadcast management systems. Regularly update and audit device firmware and configurations to ensure compliance with security best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6893678dad5a09ad00f1dae1

Added to database: 8/6/2025, 2:32:45 PM

Last enriched: 8/6/2025, 2:47:48 PM

Last updated: 8/27/2025, 11:41:59 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats