CVE-2025-66260: CWE-89 PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php. The `status_sql.php` endpoint constructs SQL UPDATE queries by directly concatenating user-controlled `sw1` and `sw2` parameters without using parameterized queries or `pg_escape_string()`. While PostgreSQL's `pg_exec` limitations prevent stacked queries, attackers can inject subqueries for data exfiltration and leverage verbose error messages for reconnaissance.
AI Analysis
Technical Summary
The vulnerability CVE-2025-66260 affects the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A., spanning a wide range of versions from 30 to 7000. The root cause is an SQL injection flaw in the status_sql.php script, which handles parameters sw1 and sw2. These parameters are incorporated directly into SQL UPDATE queries without employing parameterized queries or escaping functions such as pg_escape_string(), leading to injection opportunities. PostgreSQL's pg_exec function limits exploitation by disallowing stacked queries, but attackers can still craft subqueries within the injected input to extract sensitive data from the database. Additionally, verbose error messages returned by the system can aid attackers in reconnaissance and refining their injection payloads. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and availability with limited integrity impact. Despite the absence of known exploits or patches, the vulnerability poses a significant threat to affected systems, especially those exposed to untrusted networks.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive configuration or operational data stored in the Mozart FM Transmitter's PostgreSQL database. This could compromise confidentiality and potentially disrupt transmitter operations, impacting broadcast services. Given the critical role of FM transmitters in communication infrastructure, successful attacks could degrade service availability or enable further lateral movement within networks. Organizations in sectors such as broadcasting, emergency services, and telecommunications that rely on these devices are particularly at risk. The lack of authentication requirements means attackers can exploit the vulnerability remotely if the device interfaces are exposed to untrusted networks, increasing the attack surface. The impact is heightened in environments where these transmitters are integrated into critical communication systems, potentially affecting public safety and information dissemination.
Mitigation Recommendations
Immediate mitigation should focus on restricting network access to the status_sql.php endpoint by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. Device administrators should monitor logs for unusual requests to sw1 and sw2 parameters indicative of injection attempts. Since no patches are currently available, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting these parameters. Additionally, vendors and users should prioritize developing and applying firmware or software updates that implement parameterized queries or proper input sanitization using pg_escape_string() or equivalent. Regular security assessments and penetration testing of the transmitter interfaces should be conducted to identify exploitation attempts. Finally, organizations should prepare incident response plans to quickly address potential breaches stemming from this vulnerability.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2025-66260: CWE-89 PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php. The `status_sql.php` endpoint constructs SQL UPDATE queries by directly concatenating user-controlled `sw1` and `sw2` parameters without using parameterized queries or `pg_escape_string()`. While PostgreSQL's `pg_exec` limitations prevent stacked queries, attackers can inject subqueries for data exfiltration and leverage verbose error messages for reconnaissance.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-66260 affects the Mozart FM Transmitter devices produced by DB Electronica Telecomunicazioni S.p.A., spanning a wide range of versions from 30 to 7000. The root cause is an SQL injection flaw in the status_sql.php script, which handles parameters sw1 and sw2. These parameters are incorporated directly into SQL UPDATE queries without employing parameterized queries or escaping functions such as pg_escape_string(), leading to injection opportunities. PostgreSQL's pg_exec function limits exploitation by disallowing stacked queries, but attackers can still craft subqueries within the injected input to extract sensitive data from the database. Additionally, verbose error messages returned by the system can aid attackers in reconnaissance and refining their injection payloads. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and availability with limited integrity impact. Despite the absence of known exploits or patches, the vulnerability poses a significant threat to affected systems, especially those exposed to untrusted networks.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive configuration or operational data stored in the Mozart FM Transmitter's PostgreSQL database. This could compromise confidentiality and potentially disrupt transmitter operations, impacting broadcast services. Given the critical role of FM transmitters in communication infrastructure, successful attacks could degrade service availability or enable further lateral movement within networks. Organizations in sectors such as broadcasting, emergency services, and telecommunications that rely on these devices are particularly at risk. The lack of authentication requirements means attackers can exploit the vulnerability remotely if the device interfaces are exposed to untrusted networks, increasing the attack surface. The impact is heightened in environments where these transmitters are integrated into critical communication systems, potentially affecting public safety and information dissemination.
Mitigation Recommendations
Immediate mitigation should focus on restricting network access to the status_sql.php endpoint by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. Device administrators should monitor logs for unusual requests to sw1 and sw2 parameters indicative of injection attempts. Since no patches are currently available, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting these parameters. Additionally, vendors and users should prioritize developing and applying firmware or software updates that implement parameterized queries or proper input sanitization using pg_escape_string() or equivalent. Regular security assessments and penetration testing of the transmitter interfaces should be conducted to identify exploitation attempts. Finally, organizations should prepare incident response plans to quickly address potential breaches stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:58.504Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692654b3ca41832e1e5d9fb0
Added to database: 11/26/2025, 1:15:31 AM
Last enriched: 11/26/2025, 1:31:29 AM
Last updated: 12/3/2025, 2:53:44 AM
Views: 117
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13448: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anastis CSSIgniter Shortcodes
MediumCVE-2025-55181: Excessive Iteration (CWE-834) in Facebook proxygen
MediumCVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.