CVE-2025-66253: CWE-78 Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform User input passed directly to exec() allows remote code execution via start_upgrade.php. The `/var/tdf/start_upgrade.php` endpoint passes user-controlled `$_GET["filename"]` directly into `exec()` without sanitization or shell escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, etc.) to achieve remote code execution as the web server user (likely root).
AI Analysis
Technical Summary
CVE-2025-66253 is a critical unauthenticated OS command injection vulnerability identified in the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the start_upgrade.php script located at /var/tdf/start_upgrade.php, which accepts a GET parameter 'filename'. This parameter is passed directly to the PHP exec() function without any sanitization or shell escaping, allowing an attacker to inject arbitrary shell commands using metacharacters like ';' or '|'. Because the web server user is likely running with root privileges, successful exploitation results in remote code execution with full system privileges. The vulnerability affects a broad range of product versions (30 through 7000), indicating a long-standing and widespread issue across the product line. The CVSS v4.0 score of 9.9 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), its network attack vector, and the high impact on confidentiality, integrity, and availability. No patches are currently listed, and no known exploits have been reported in the wild, but the vulnerability's nature makes it a prime target for attackers aiming to compromise broadcast infrastructure. The affected devices are typically used in FM transmission and broadcasting environments, making them critical infrastructure components. Attackers could leverage this vulnerability to disrupt broadcast services, exfiltrate sensitive data, or pivot into broader network environments.
Potential Impact
For European organizations, especially those in the broadcasting and telecommunications sectors, this vulnerability poses a severe risk. Exploitation can lead to complete system takeover of FM transmitter devices, potentially disrupting radio broadcast services which are critical for communication, emergency alerts, and media distribution. The compromise of these devices could also serve as a foothold for lateral movement into enterprise networks, threatening broader organizational IT infrastructure. Confidentiality is at risk due to possible data exfiltration, integrity is compromised as attackers can alter device configurations or firmware, and availability is threatened through potential denial-of-service or sabotage of transmission capabilities. Given the critical role of FM transmitters in public communication, exploitation could have cascading effects on public safety and information dissemination. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks or insufficiently segmented. The impact extends beyond individual organizations to national communication infrastructures, making this a high-priority threat for European critical infrastructure protection.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Mozart FM Transmitter devices from public and untrusted networks to prevent unauthorized access to the start_upgrade.php endpoint. 2. Access control: Implement strict firewall rules and access control lists (ACLs) to restrict access to the vulnerable endpoint only to trusted management networks or IP addresses. 3. Monitoring and detection: Deploy network and host-based intrusion detection systems (IDS) to monitor for suspicious requests targeting start_upgrade.php or unusual command execution patterns on the devices. 4. Vendor engagement: Engage with DB Electronica Telecomunicazioni S.p.A. to obtain patches or firmware updates addressing the vulnerability as soon as they become available. 5. Temporary workaround: If patching is not immediately possible, consider disabling or restricting access to the start_upgrade.php script or the web management interface entirely, if operationally feasible. 6. Incident response readiness: Prepare for potential exploitation by establishing incident response plans specific to broadcast infrastructure compromise. 7. Regular audits: Conduct security audits and penetration tests focusing on broadcast and telecommunications equipment to identify similar vulnerabilities. 8. User training: Educate network administrators and operators about the risks of exposing management interfaces and the importance of secure configuration.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2025-66253: CWE-78 Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform User input passed directly to exec() allows remote code execution via start_upgrade.php. The `/var/tdf/start_upgrade.php` endpoint passes user-controlled `$_GET["filename"]` directly into `exec()` without sanitization or shell escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, etc.) to achieve remote code execution as the web server user (likely root).
AI-Powered Analysis
Technical Analysis
CVE-2025-66253 is a critical unauthenticated OS command injection vulnerability identified in the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the start_upgrade.php script located at /var/tdf/start_upgrade.php, which accepts a GET parameter 'filename'. This parameter is passed directly to the PHP exec() function without any sanitization or shell escaping, allowing an attacker to inject arbitrary shell commands using metacharacters like ';' or '|'. Because the web server user is likely running with root privileges, successful exploitation results in remote code execution with full system privileges. The vulnerability affects a broad range of product versions (30 through 7000), indicating a long-standing and widespread issue across the product line. The CVSS v4.0 score of 9.9 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), its network attack vector, and the high impact on confidentiality, integrity, and availability. No patches are currently listed, and no known exploits have been reported in the wild, but the vulnerability's nature makes it a prime target for attackers aiming to compromise broadcast infrastructure. The affected devices are typically used in FM transmission and broadcasting environments, making them critical infrastructure components. Attackers could leverage this vulnerability to disrupt broadcast services, exfiltrate sensitive data, or pivot into broader network environments.
Potential Impact
For European organizations, especially those in the broadcasting and telecommunications sectors, this vulnerability poses a severe risk. Exploitation can lead to complete system takeover of FM transmitter devices, potentially disrupting radio broadcast services which are critical for communication, emergency alerts, and media distribution. The compromise of these devices could also serve as a foothold for lateral movement into enterprise networks, threatening broader organizational IT infrastructure. Confidentiality is at risk due to possible data exfiltration, integrity is compromised as attackers can alter device configurations or firmware, and availability is threatened through potential denial-of-service or sabotage of transmission capabilities. Given the critical role of FM transmitters in public communication, exploitation could have cascading effects on public safety and information dissemination. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks or insufficiently segmented. The impact extends beyond individual organizations to national communication infrastructures, making this a high-priority threat for European critical infrastructure protection.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Mozart FM Transmitter devices from public and untrusted networks to prevent unauthorized access to the start_upgrade.php endpoint. 2. Access control: Implement strict firewall rules and access control lists (ACLs) to restrict access to the vulnerable endpoint only to trusted management networks or IP addresses. 3. Monitoring and detection: Deploy network and host-based intrusion detection systems (IDS) to monitor for suspicious requests targeting start_upgrade.php or unusual command execution patterns on the devices. 4. Vendor engagement: Engage with DB Electronica Telecomunicazioni S.p.A. to obtain patches or firmware updates addressing the vulnerability as soon as they become available. 5. Temporary workaround: If patching is not immediately possible, consider disabling or restricting access to the start_upgrade.php script or the web management interface entirely, if operationally feasible. 6. Incident response readiness: Prepare for potential exploitation by establishing incident response plans specific to broadcast infrastructure compromise. 7. Regular audits: Conduct security audits and penetration tests focusing on broadcast and telecommunications equipment to identify similar vulnerabilities. 8. User training: Educate network administrators and operators about the risks of exposing management interfaces and the importance of secure configuration.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:33.790Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69265837ca41832e1e5f38f3
Added to database: 11/26/2025, 1:30:31 AM
Last enriched: 12/3/2025, 4:35:33 PM
Last updated: 12/4/2025, 10:23:12 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66506: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore fulcio
HighCVE-2025-1547: CWE-121 Stack-based Buffer Overflow in WatchGuard Fireware OS
HighCVE-2025-10285: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in silabs.com Simplicity Studio V6
HighCVE-2025-1910: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in WatchGuard Mobile VPN with SSL Client
MediumCVE-2025-12986: CWE-410 Insufficient Resource Pool in silabs.com Gecko SDK
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.