CVE-2025-66256: CWE-434 Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Unrestricted file upload in patch_contents.php allows uploading malicious files. The `/var/tdf/patch_contents.php` endpoint allows unauthenticated arbitrary file uploads without file type validation, MIME checking, or size restrictions beyond 16MB, enabling attackers to upload malicious files.
AI Analysis
Technical Summary
CVE-2025-66256 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the patch_contents.php endpoint located at /var/tdf/patch_contents.php, which allows unauthenticated attackers to upload arbitrary files without any file type validation, MIME type checking, or size restrictions beyond a 16MB limit. This lack of validation enables attackers to upload malicious payloads such as web shells, scripts, or other executable files that can be leveraged to gain remote code execution or persistent access on the affected devices. The vulnerability impacts a wide range of product versions, from version 30 through 7000, indicating a long-standing and pervasive issue across the product line. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:N/SA:N) highlights that the attack can be performed remotely over the network with low complexity, no authentication, and no user interaction, resulting in high confidentiality and integrity impact, and a limited availability impact. Although no known exploits have been reported in the wild yet, the critical nature of this vulnerability and the ease of exploitation make it a prime target for attackers. The affected devices are typically used in FM broadcasting infrastructure, making them critical components in telecommunications and media delivery networks. Successful exploitation could allow attackers to disrupt broadcast services, intercept or manipulate transmitted content, or use the compromised devices as footholds for further network intrusion.
Potential Impact
For European organizations, particularly broadcasters and telecommunications providers using Mozart FM Transmitter devices, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over critical broadcast infrastructure, resulting in service outages, content tampering, or data exfiltration. The compromise of these devices could also serve as a pivot point for attackers to infiltrate broader organizational networks, potentially impacting other critical systems. Given the criticality of media and communication services in Europe, disruption could have significant economic and reputational consequences. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed or if service availability is compromised. The broad range of affected versions suggests many deployed devices remain vulnerable, increasing the attack surface. The lack of authentication and ease of exploitation further exacerbate the threat, making immediate mitigation essential to prevent potential attacks.
Mitigation Recommendations
Organizations should prioritize the following mitigation steps: 1) Monitor vendor communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly across all affected devices. 2) Until patches are available, restrict network access to the patch_contents.php endpoint by implementing strict firewall rules and network segmentation to isolate transmitter devices from untrusted networks. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor for unusual file upload attempts or suspicious activity targeting the device management interfaces. 4) Conduct regular audits of device configurations and logs to detect unauthorized access or file uploads. 5) Implement multi-factor authentication and strong access controls on all management interfaces to reduce the risk of unauthorized exploitation. 6) Consider deploying application-layer gateways or reverse proxies that can enforce file upload restrictions and validate content before reaching the device. 7) Educate operational staff about the risks and signs of compromise related to this vulnerability. These targeted measures go beyond generic advice by focusing on controlling access to the vulnerable endpoint and enhancing detection capabilities specific to this threat.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2025-66256: CWE-434 Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Unrestricted file upload in patch_contents.php allows uploading malicious files. The `/var/tdf/patch_contents.php` endpoint allows unauthenticated arbitrary file uploads without file type validation, MIME checking, or size restrictions beyond 16MB, enabling attackers to upload malicious files.
AI-Powered Analysis
Technical Analysis
CVE-2025-66256 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the patch_contents.php endpoint located at /var/tdf/patch_contents.php, which allows unauthenticated attackers to upload arbitrary files without any file type validation, MIME type checking, or size restrictions beyond a 16MB limit. This lack of validation enables attackers to upload malicious payloads such as web shells, scripts, or other executable files that can be leveraged to gain remote code execution or persistent access on the affected devices. The vulnerability impacts a wide range of product versions, from version 30 through 7000, indicating a long-standing and pervasive issue across the product line. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:N/SA:N) highlights that the attack can be performed remotely over the network with low complexity, no authentication, and no user interaction, resulting in high confidentiality and integrity impact, and a limited availability impact. Although no known exploits have been reported in the wild yet, the critical nature of this vulnerability and the ease of exploitation make it a prime target for attackers. The affected devices are typically used in FM broadcasting infrastructure, making them critical components in telecommunications and media delivery networks. Successful exploitation could allow attackers to disrupt broadcast services, intercept or manipulate transmitted content, or use the compromised devices as footholds for further network intrusion.
Potential Impact
For European organizations, particularly broadcasters and telecommunications providers using Mozart FM Transmitter devices, this vulnerability poses a severe risk. Exploitation could lead to unauthorized control over critical broadcast infrastructure, resulting in service outages, content tampering, or data exfiltration. The compromise of these devices could also serve as a pivot point for attackers to infiltrate broader organizational networks, potentially impacting other critical systems. Given the criticality of media and communication services in Europe, disruption could have significant economic and reputational consequences. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed or if service availability is compromised. The broad range of affected versions suggests many deployed devices remain vulnerable, increasing the attack surface. The lack of authentication and ease of exploitation further exacerbate the threat, making immediate mitigation essential to prevent potential attacks.
Mitigation Recommendations
Organizations should prioritize the following mitigation steps: 1) Monitor vendor communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly across all affected devices. 2) Until patches are available, restrict network access to the patch_contents.php endpoint by implementing strict firewall rules and network segmentation to isolate transmitter devices from untrusted networks. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor for unusual file upload attempts or suspicious activity targeting the device management interfaces. 4) Conduct regular audits of device configurations and logs to detect unauthorized access or file uploads. 5) Implement multi-factor authentication and strong access controls on all management interfaces to reduce the risk of unauthorized exploitation. 6) Consider deploying application-layer gateways or reverse proxies that can enforce file upload restrictions and validate content before reaching the device. 7) Educate operational staff about the risks and signs of compromise related to this vulnerability. These targeted measures go beyond generic advice by focusing on controlling access to the vulnerable endpoint and enhancing detection capabilities specific to this threat.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:33.791Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69265837ca41832e1e5f38fc
Added to database: 11/26/2025, 1:30:31 AM
Last enriched: 12/3/2025, 4:34:40 PM
Last updated: 12/4/2025, 10:26:36 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66506: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore fulcio
HighCVE-2025-1547: CWE-121 Stack-based Buffer Overflow in WatchGuard Fireware OS
HighCVE-2025-10285: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in silabs.com Simplicity Studio V6
HighCVE-2025-1910: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in WatchGuard Mobile VPN with SSL Client
MediumCVE-2025-12986: CWE-410 Insufficient Resource Pool in silabs.com Gecko SDK
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.