Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66258: CWE-79 Stored Cross-Site Scripting via XML Injection in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter

0
High
VulnerabilityCVE-2025-66258cvecve-2025-66258cwe-79
Published: Wed Nov 26 2025 (11/26/2025, 00:45:39 UTC)
Source: CVE Database V5
Vendor/Project: DB Electronica Telecomunicazioni S.p.A.
Product: Mozart FM Transmitter

Description

Stored Cross-Site Scripting via XML Injection in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Stored XSS via crafted filenames injected into patchlist.xml. User-controlled filenames are directly concatenated into `patchlist.xml` without encoding, allowing injection of malicious JavaScript payloads via crafted filenames (e.g., `<img src=x onerror=alert()>.bin`). The XSS executes when ajax.js processes and renders the XML file.

AI-Powered Analysis

AILast updated: 12/03/2025, 04:25:33 UTC

Technical Analysis

CVE-2025-66258 is a stored cross-site scripting vulnerability classified under CWE-79, discovered in multiple versions of the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A. The vulnerability stems from the insecure handling of user-supplied filenames that are concatenated directly into the patchlist.xml file without proper encoding or sanitization. Attackers can craft filenames containing malicious JavaScript payloads, such as <img src=x onerror=alert()>.bin, which get stored persistently in the system. When the ajax.js script processes and renders the patchlist.xml file in the device's web interface, the injected script executes in the context of the user's browser. This stored XSS can be exploited remotely without authentication but requires user interaction, typically an administrator or operator accessing the device's management interface. The CVSS 4.0 score of 7.1 reflects a high severity due to network attack vector, low attack complexity, no privileges required, partial user interaction, and high impact on confidentiality and partial impact on integrity and availability. The vulnerability could allow attackers to hijack sessions, steal credentials, or pivot into the internal network, potentially disrupting broadcast operations or compromising sensitive data. Although no exploits are currently known in the wild, the broad range of affected versions (from 30 to 7000) indicates widespread exposure. The lack of available patches necessitates immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, especially broadcasters and telecom operators using Mozart FM Transmitter devices, this vulnerability poses significant risks. Successful exploitation could lead to unauthorized access to device management interfaces, enabling attackers to manipulate broadcast signals, disrupt services, or exfiltrate sensitive operational data. The confidentiality of credentials and session tokens is at risk, potentially allowing lateral movement within critical infrastructure networks. Given the role of FM transmitters in public communications, exploitation could also impact public safety communications or emergency alert systems. The persistent nature of stored XSS increases the likelihood of repeated exploitation. The impact extends beyond individual devices to the broader network and service availability, potentially causing reputational damage and regulatory consequences under GDPR if personal data is compromised.

Mitigation Recommendations

Specific mitigations include: 1) Immediate restriction of access to the transmitter's web management interface using network segmentation and firewall rules to limit exposure to trusted administrators only. 2) Implement input validation and output encoding on filenames before they are stored or rendered, ideally by applying patches or firmware updates once available. 3) Employ web application firewalls (WAFs) capable of detecting and blocking malicious XML payloads or suspicious script injections targeting patchlist.xml. 4) Conduct regular security audits and monitoring of device logs for unusual filename entries or access patterns. 5) Educate administrators to avoid opening or interacting with suspicious filenames or updates. 6) If possible, disable or isolate ajax.js processing of patchlist.xml until a secure fix is deployed. 7) Coordinate with DB Electronica Telecomunicazioni S.p.A. for timely patches and advisories. 8) Implement multi-factor authentication and session management hardening on management interfaces to reduce impact if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2025-11-26T00:21:33.791Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692654b3ca41832e1e5d9faa

Added to database: 11/26/2025, 1:15:31 AM

Last enriched: 12/3/2025, 4:25:33 AM

Last updated: 1/18/2026, 5:55:34 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats