Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66250: CWE-434 Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter

0
Critical
VulnerabilityCVE-2025-66250cvecve-2025-66250cwe-434
Published: Wed Nov 26 2025 (11/26/2025, 00:29:57 UTC)
Source: CVE Database V5
Vendor/Project: DB Electronica Telecomunicazioni S.p.A.
Product: Mozart FM Transmitter

Description

Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Allows unauthenticated arbitrary file upload via /var/tdf/status_contents.php.

AI-Powered Analysis

AILast updated: 12/03/2025, 04:28:18 UTC

Technical Analysis

CVE-2025-66250 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting DB Electronica Telecomunicazioni S.p.A.'s Mozart FM Transmitter devices, versions 30 through 7000. The vulnerability resides in the status_contents.php script, which improperly handles file uploads, allowing unauthenticated attackers to upload arbitrary files to the device's filesystem, specifically via the /var/tdf/status_contents.php endpoint. Because no authentication or user interaction is required, an attacker can remotely exploit this flaw over the network. The uploaded files could include malicious scripts or binaries, enabling remote code execution or persistent backdoors. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:H/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and broad version impact make it a high-risk issue. The affected devices are commonly used in FM broadcasting infrastructure, which is critical for communication and media dissemination. Exploitation could disrupt broadcasting services, leak sensitive operational data, or allow attackers to pivot into broader network environments. The lack of available patches at the time of disclosure necessitates immediate risk management and mitigation strategies.

Potential Impact

For European organizations, especially broadcasters and telecommunications providers using Mozart FM Transmitter devices, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over broadcasting equipment, resulting in service outages, manipulation of broadcast content, or espionage through data exfiltration. The integrity and availability of critical communication channels could be compromised, impacting emergency broadcasts and public information dissemination. Additionally, attackers could leverage compromised devices as footholds to infiltrate wider organizational networks, threatening broader IT infrastructure. The critical CVSS score underscores the potential for widespread disruption without requiring user interaction or credentials. Given Europe's reliance on robust communication infrastructure, this vulnerability could have cascading effects on media companies, emergency services, and regulatory compliance with data protection laws such as GDPR if sensitive data is exposed.

Mitigation Recommendations

Immediate mitigation should focus on network-level protections, including isolating affected Mozart FM Transmitter devices from untrusted networks and restricting access to management interfaces. Organizations should implement strict firewall rules to block unauthorized inbound traffic to the status_contents.php endpoint. Continuous monitoring for anomalous file uploads or unexpected changes in device file systems is essential. Until official patches are released, consider deploying web application firewalls (WAFs) with custom rules to detect and block arbitrary file upload attempts targeting the vulnerable endpoint. Conduct thorough audits of device configurations and firmware versions to identify affected units. Engage with DB Electronica Telecomunicazioni S.p.A. for timely patch releases and apply updates as soon as they become available. Additionally, implement network segmentation to limit lateral movement if a device is compromised and maintain incident response plans tailored to broadcasting infrastructure attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2025-11-26T00:21:33.790Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69265837ca41832e1e5f38ea

Added to database: 11/26/2025, 1:30:31 AM

Last enriched: 12/3/2025, 4:28:18 AM

Last updated: 12/3/2025, 9:47:03 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats