CVE-2025-66259: CWE-20 Improper Input Validation in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Authenticated Root Remote Code Execution via improrer user input filtering in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform in main_ok.php user supplied data/hour/time is passed directly into date shell command
AI Analysis
Technical Summary
CVE-2025-66259 is a critical remote code execution vulnerability in the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A., affecting versions 30 through 7000. The root cause is improper input validation (CWE-20) in the main_ok.php script, where user-supplied parameters related to date/time (hour/time) are passed directly into a shell command without sanitization. This allows an authenticated attacker with root privileges to inject arbitrary shell commands, leading to remote code execution. The vulnerability does not require user interaction and can be exploited over the network (AV:N), with low attack complexity (AC:L), and no need for additional privileges beyond root (PR:H). The CVSS 4.0 vector indicates high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:N), with a scope change (SC:H) and no social engineering involved. Although no public exploits are known yet, the vulnerability's nature and severity make it a critical risk. The flaw affects a broad range of product versions, indicating a long-standing issue possibly present in many deployed devices. The vulnerability could allow attackers to take full control over the transmitter devices, potentially disrupting broadcast services or using the devices as pivot points for further network compromise.
Potential Impact
For European organizations, especially broadcasters and telecom operators using Mozart FM Transmitters, this vulnerability could lead to severe operational disruptions by enabling attackers to execute arbitrary commands remotely with root privileges. This could result in unauthorized control over transmission equipment, manipulation or interruption of broadcast signals, and potential data breaches if the devices are connected to broader network infrastructure. The compromise of such critical infrastructure could affect public communication channels, emergency broadcast systems, and commercial media services. Additionally, attackers could leverage compromised devices to launch lateral attacks within organizational networks, increasing the risk of widespread impact. The high severity and ease of exploitation elevate the threat level, necessitating urgent attention to prevent service outages and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting root-level access to the affected devices, ensuring that only trusted administrators can authenticate. Organizations should implement network segmentation to isolate transmitter devices from general IT infrastructure, reducing attack surface exposure. Input validation controls must be enhanced in the main_ok.php script to sanitize all user-supplied parameters before passing them to shell commands, ideally replacing shell calls with safer APIs. Until patches are released, monitoring logs for unusual command executions or access patterns is critical to detect exploitation attempts early. Employing application-level firewalls or intrusion detection systems tailored to recognize exploitation signatures can provide additional protection. Organizations should engage with DB Electronica Telecomunicazioni for timely patches and updates and plan for rapid deployment. Regular backups and incident response readiness will help mitigate potential damage if exploitation occurs.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2025-66259: CWE-20 Improper Input Validation in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
Authenticated Root Remote Code Execution via improrer user input filtering in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform in main_ok.php user supplied data/hour/time is passed directly into date shell command
AI-Powered Analysis
Technical Analysis
CVE-2025-66259 is a critical remote code execution vulnerability in the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A., affecting versions 30 through 7000. The root cause is improper input validation (CWE-20) in the main_ok.php script, where user-supplied parameters related to date/time (hour/time) are passed directly into a shell command without sanitization. This allows an authenticated attacker with root privileges to inject arbitrary shell commands, leading to remote code execution. The vulnerability does not require user interaction and can be exploited over the network (AV:N), with low attack complexity (AC:L), and no need for additional privileges beyond root (PR:H). The CVSS 4.0 vector indicates high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:N), with a scope change (SC:H) and no social engineering involved. Although no public exploits are known yet, the vulnerability's nature and severity make it a critical risk. The flaw affects a broad range of product versions, indicating a long-standing issue possibly present in many deployed devices. The vulnerability could allow attackers to take full control over the transmitter devices, potentially disrupting broadcast services or using the devices as pivot points for further network compromise.
Potential Impact
For European organizations, especially broadcasters and telecom operators using Mozart FM Transmitters, this vulnerability could lead to severe operational disruptions by enabling attackers to execute arbitrary commands remotely with root privileges. This could result in unauthorized control over transmission equipment, manipulation or interruption of broadcast signals, and potential data breaches if the devices are connected to broader network infrastructure. The compromise of such critical infrastructure could affect public communication channels, emergency broadcast systems, and commercial media services. Additionally, attackers could leverage compromised devices to launch lateral attacks within organizational networks, increasing the risk of widespread impact. The high severity and ease of exploitation elevate the threat level, necessitating urgent attention to prevent service outages and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting root-level access to the affected devices, ensuring that only trusted administrators can authenticate. Organizations should implement network segmentation to isolate transmitter devices from general IT infrastructure, reducing attack surface exposure. Input validation controls must be enhanced in the main_ok.php script to sanitize all user-supplied parameters before passing them to shell commands, ideally replacing shell calls with safer APIs. Until patches are released, monitoring logs for unusual command executions or access patterns is critical to detect exploitation attempts early. Employing application-level firewalls or intrusion detection systems tailored to recognize exploitation signatures can provide additional protection. Organizations should engage with DB Electronica Telecomunicazioni for timely patches and updates and plan for rapid deployment. Regular backups and incident response readiness will help mitigate potential damage if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:33.791Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692654b3ca41832e1e5d9fad
Added to database: 11/26/2025, 1:15:31 AM
Last enriched: 11/26/2025, 1:31:41 AM
Last updated: 11/26/2025, 8:58:07 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62728: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Hive
UnknownCVE-2025-9558: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in zephyrproject-rtos Zephyr
HighCVE-2025-9557: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in zephyrproject-rtos Zephyr
HighCVE-2025-13735: CWE-125 Out-of-bounds Read in ASR Lapwing_Linux
HighCVE-2025-59820: CWE-1284 Improper Validation of Specified Quantity in Input in KDE Krita
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.