CVE-2025-66250: CWE-434 Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Allows unauthenticated arbitrary file upload via /var/tdf/status_contents.php.
AI Analysis
Technical Summary
CVE-2025-66250 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting DB Electronica Telecomunicazioni S.p.A.'s Mozart FM Transmitter devices, versions 30 through 7000. The vulnerability resides in the status_contents.php script, which improperly handles file uploads, allowing unauthenticated attackers to upload arbitrary files to the device's filesystem, specifically via the /var/tdf/status_contents.php endpoint. Because no authentication or user interaction is required, an attacker can remotely exploit this flaw over the network. The uploaded files could include malicious scripts or binaries, enabling remote code execution or persistent backdoors. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:H/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and broad version impact make it a high-risk issue. The affected devices are commonly used in FM broadcasting infrastructure, which is critical for communication and media dissemination. Exploitation could disrupt broadcasting services, leak sensitive operational data, or allow attackers to pivot into broader network environments. The lack of available patches at the time of disclosure necessitates immediate risk management and mitigation strategies.
Potential Impact
For European organizations, especially broadcasters and telecommunications providers using Mozart FM Transmitter devices, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over broadcasting equipment, resulting in service outages, manipulation of broadcast content, or espionage through data exfiltration. The integrity and availability of critical communication channels could be compromised, impacting emergency broadcasts and public information dissemination. Additionally, attackers could leverage compromised devices as footholds to infiltrate wider organizational networks, threatening broader IT infrastructure. The critical CVSS score underscores the potential for widespread disruption without requiring user interaction or credentials. Given Europe's reliance on robust communication infrastructure, this vulnerability could have cascading effects on media companies, emergency services, and regulatory compliance with data protection laws such as GDPR if sensitive data is exposed.
Mitigation Recommendations
Immediate mitigation should focus on network-level protections, including isolating affected Mozart FM Transmitter devices from untrusted networks and restricting access to management interfaces. Organizations should implement strict firewall rules to block unauthorized inbound traffic to the status_contents.php endpoint. Continuous monitoring for anomalous file uploads or unexpected changes in device file systems is essential. Until official patches are released, consider deploying web application firewalls (WAFs) with custom rules to detect and block arbitrary file upload attempts targeting the vulnerable endpoint. Conduct thorough audits of device configurations and firmware versions to identify affected units. Engage with DB Electronica Telecomunicazioni S.p.A. for timely patch releases and apply updates as soon as they become available. Additionally, implement network segmentation to limit lateral movement if a device is compromised and maintain incident response plans tailored to broadcasting infrastructure attacks.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2025-66250: CWE-434 Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Allows unauthenticated arbitrary file upload via /var/tdf/status_contents.php.
AI-Powered Analysis
Technical Analysis
CVE-2025-66250 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting DB Electronica Telecomunicazioni S.p.A.'s Mozart FM Transmitter devices, versions 30 through 7000. The vulnerability resides in the status_contents.php script, which improperly handles file uploads, allowing unauthenticated attackers to upload arbitrary files to the device's filesystem, specifically via the /var/tdf/status_contents.php endpoint. Because no authentication or user interaction is required, an attacker can remotely exploit this flaw over the network. The uploaded files could include malicious scripts or binaries, enabling remote code execution or persistent backdoors. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:H/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and broad version impact make it a high-risk issue. The affected devices are commonly used in FM broadcasting infrastructure, which is critical for communication and media dissemination. Exploitation could disrupt broadcasting services, leak sensitive operational data, or allow attackers to pivot into broader network environments. The lack of available patches at the time of disclosure necessitates immediate risk management and mitigation strategies.
Potential Impact
For European organizations, especially broadcasters and telecommunications providers using Mozart FM Transmitter devices, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over broadcasting equipment, resulting in service outages, manipulation of broadcast content, or espionage through data exfiltration. The integrity and availability of critical communication channels could be compromised, impacting emergency broadcasts and public information dissemination. Additionally, attackers could leverage compromised devices as footholds to infiltrate wider organizational networks, threatening broader IT infrastructure. The critical CVSS score underscores the potential for widespread disruption without requiring user interaction or credentials. Given Europe's reliance on robust communication infrastructure, this vulnerability could have cascading effects on media companies, emergency services, and regulatory compliance with data protection laws such as GDPR if sensitive data is exposed.
Mitigation Recommendations
Immediate mitigation should focus on network-level protections, including isolating affected Mozart FM Transmitter devices from untrusted networks and restricting access to management interfaces. Organizations should implement strict firewall rules to block unauthorized inbound traffic to the status_contents.php endpoint. Continuous monitoring for anomalous file uploads or unexpected changes in device file systems is essential. Until official patches are released, consider deploying web application firewalls (WAFs) with custom rules to detect and block arbitrary file upload attempts targeting the vulnerable endpoint. Conduct thorough audits of device configurations and firmware versions to identify affected units. Engage with DB Electronica Telecomunicazioni S.p.A. for timely patch releases and apply updates as soon as they become available. Additionally, implement network segmentation to limit lateral movement if a device is compromised and maintain incident response plans tailored to broadcasting infrastructure attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:33.790Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69265837ca41832e1e5f38ea
Added to database: 11/26/2025, 1:30:31 AM
Last enriched: 12/3/2025, 4:28:18 AM
Last updated: 12/3/2025, 9:47:03 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
MediumCVE-2025-12744: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighCVE-2025-29864: CWE-693 Protection Mechanism Failure in ESTsoft ALZip
MediumCVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MediumCVE-2025-13945: CWE-1325: Improperly Controlled Sequential Memory Allocation in Wireshark Foundation Wireshark
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.