Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66256: CWE-434 Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter

0
Critical
VulnerabilityCVE-2025-66256cvecve-2025-66256cwe-434
Published: Wed Nov 26 2025 (11/26/2025, 00:41:08 UTC)
Source: CVE Database V5
Vendor/Project: DB Electronica Telecomunicazioni S.p.A.
Product: Mozart FM Transmitter

Description

Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Unrestricted file upload in patch_contents.php allows uploading malicious files. The `/var/tdf/patch_contents.php` endpoint allows unauthenticated arbitrary file uploads without file type validation, MIME checking, or size restrictions beyond 16MB, enabling attackers to upload malicious files.

AI-Powered Analysis

AILast updated: 12/03/2025, 16:34:40 UTC

Technical Analysis

CVE-2025-66256 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the patch_contents.php endpoint located at /var/tdf/patch_contents.php, which allows unauthenticated attackers to upload arbitrary files without any file type validation, MIME type checking, or size restrictions beyond a 16MB limit. This lack of validation enables attackers to upload malicious payloads such as web shells, scripts, or other executable files that can be leveraged to gain remote code execution or persistent access on the affected devices. The vulnerability impacts a wide range of product versions, from version 30 through 7000, indicating a long-standing and pervasive issue across the product line. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:N/SA:N) highlights that the attack can be performed remotely over the network with low complexity, no authentication, and no user interaction, resulting in high confidentiality and integrity impact, and a limited availability impact. Although no known exploits have been reported in the wild yet, the critical nature of this vulnerability and the ease of exploitation make it a prime target for attackers. The affected devices are typically used in FM broadcasting infrastructure, making them critical components in telecommunications and media delivery networks. Successful exploitation could allow attackers to disrupt broadcast services, intercept or manipulate transmitted content, or use the compromised devices as footholds for further network intrusion.

Potential Impact

For European organizations, particularly broadcasters and telecommunications providers using Mozart FM Transmitter devices, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over critical broadcast infrastructure, resulting in service outages, content tampering, or data exfiltration. The compromise of these devices could also serve as a pivot point for attackers to infiltrate broader organizational networks, potentially impacting other critical systems. Given the criticality of media and communication services in Europe, disruption could have significant economic and reputational consequences. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed or if service availability is compromised. The broad range of affected versions suggests many deployed devices remain vulnerable, increasing the attack surface. The lack of authentication and ease of exploitation further exacerbate the threat, making immediate mitigation essential to prevent potential attacks.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Monitor vendor communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly across all affected devices. 2) Until patches are available, restrict network access to the patch_contents.php endpoint by implementing strict firewall rules and network segmentation to isolate transmitter devices from untrusted networks. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor for unusual file upload attempts or suspicious activity targeting the device management interfaces. 4) Conduct regular audits of device configurations and logs to detect unauthorized access or file uploads. 5) Implement multi-factor authentication and strong access controls on all management interfaces to reduce the risk of unauthorized exploitation. 6) Consider deploying application-layer gateways or reverse proxies that can enforce file upload restrictions and validate content before reaching the device. 7) Educate operational staff about the risks and signs of compromise related to this vulnerability. These targeted measures go beyond generic advice by focusing on controlling access to the vulnerable endpoint and enhancing detection capabilities specific to this threat.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2025-11-26T00:21:33.791Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69265837ca41832e1e5f38fc

Added to database: 11/26/2025, 1:30:31 AM

Last enriched: 12/3/2025, 4:34:40 PM

Last updated: 12/4/2025, 10:26:36 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats