Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63228: n/a

0
Critical
VulnerabilityCVE-2025-63228cvecve-2025-63228
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Mozart FM Transmitter web management interface on version WEBMOZZI-00287, contains an unauthenticated file upload vulnerability in the /upload_file.php endpoint. An attacker can exploit this by sending a crafted POST request with a malicious file (e.g., a PHP webshell) to the server. The uploaded file is stored in the /upload/ directory, enabling remote code execution and full system compromise.

AI-Powered Analysis

AILast updated: 11/25/2025, 21:05:17 UTC

Technical Analysis

The vulnerability identified as CVE-2025-63228 affects the Mozart FM Transmitter's web management interface, specifically version WEBMOZZI-00287. It resides in the /upload_file.php endpoint, which improperly handles file uploads without any authentication or authorization checks. An attacker can craft a POST request containing a malicious file, such as a PHP webshell, which the server stores in the /upload/ directory. This allows the attacker to execute arbitrary code remotely, potentially gaining full control over the device and the underlying system. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 9.8, reflecting its critical severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). Although no patches or known exploits are currently documented, the risk is high due to the ease of exploitation and the potential for complete system compromise. The Mozart FM Transmitter is typically used in broadcasting and communication environments, making this vulnerability particularly dangerous if exploited in operational technology or critical infrastructure contexts.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Compromise of the Mozart FM Transmitter devices could lead to unauthorized access to broadcast systems, manipulation or disruption of FM transmissions, and potential pivoting into broader corporate or industrial networks. Confidential data could be exfiltrated, and attackers could disrupt services critical to communication infrastructure. Given the criticality of communication systems in sectors such as media, emergency services, and transportation, exploitation could cause widespread operational disruptions and reputational damage. Additionally, attackers gaining persistent access could use these devices as footholds for further attacks within European networks. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially if these devices are exposed to the internet or poorly segmented networks.

Mitigation Recommendations

1. Immediately isolate affected Mozart FM Transmitter devices from the internet and untrusted networks to prevent external exploitation. 2. Disable or restrict access to the /upload_file.php endpoint if possible, or implement network-level controls such as firewalls or web application firewalls (WAFs) to block unauthorized POST requests to this endpoint. 3. Monitor network traffic and device logs for unusual file upload activity or execution of unexpected scripts. 4. Employ strict network segmentation to separate broadcast devices from critical IT infrastructure. 5. If vendor patches become available, prioritize their deployment after testing. 6. Conduct thorough audits of all Mozart FM Transmitter devices to identify any signs of compromise or unauthorized file uploads. 7. Implement intrusion detection systems (IDS) tuned to detect webshell signatures and anomalous behaviors on these devices. 8. Educate operational technology (OT) and IT teams about this vulnerability to ensure rapid response and containment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691cd3b5b044fc99aa3e1008

Added to database: 11/18/2025, 8:14:45 PM

Last enriched: 11/25/2025, 9:05:17 PM

Last updated: 1/7/2026, 4:17:08 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats