CVE-2025-66261: CWE-78 Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.
AI Analysis
Technical Summary
CVE-2025-66261 is a critical unauthenticated OS command injection vulnerability affecting multiple versions (30 through 7000) of the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A. The vulnerability exists in the /var/tdf/restore_settings.php endpoint, where the 'name' parameter received via HTTP GET is URL-decoded and passed directly to the PHP exec() function without any input validation or escaping. This allows an attacker to inject arbitrary shell commands using metacharacters such as ';', '|', or '&&', leading to remote code execution with the privileges of the web server user. The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The affected devices are specialized FM transmitters used in broadcasting infrastructure, which may be deployed in critical communication environments. Although no public exploits have been reported yet, the straightforward exploitation method and critical impact make this a high-priority vulnerability for affected organizations to address promptly.
Potential Impact
The vulnerability allows unauthenticated remote attackers to execute arbitrary OS commands on affected Mozart FM Transmitter devices, potentially leading to full compromise of the device. This can result in unauthorized access to sensitive broadcast configurations, disruption or manipulation of FM transmission services, and use of the compromised device as a foothold for lateral movement within organizational networks. For European organizations, especially broadcasters and telecom operators relying on these devices, this could lead to significant operational outages, reputational damage, and regulatory compliance issues under frameworks like GDPR if personal data or critical infrastructure is impacted. The ability to execute commands as the web server user could also facilitate installation of persistent malware or pivoting attacks against other network assets. Given the criticality and ease of exploitation, the threat poses a severe risk to the availability and integrity of broadcast services and associated communication infrastructure in Europe.
Mitigation Recommendations
1. Immediately restrict network access to the /var/tdf/restore_settings.php endpoint by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Disable the restore_settings.php functionality if it is not essential for operations until a patch is available. 3. Monitor network traffic and device logs for suspicious requests containing shell metacharacters or unusual command patterns targeting the 'name' parameter. 4. Engage with DB Electronica Telecomunicazioni S.p.A. to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they are released. 5. Implement web application firewall (WAF) rules to detect and block command injection attempts targeting this endpoint. 6. Conduct thorough security assessments of all Mozart FM Transmitter devices in use to identify any signs of compromise. 7. Establish incident response plans specific to broadcast infrastructure to quickly contain and remediate potential exploitation. 8. Educate operational technology (OT) and IT teams on the risks and detection methods related to this vulnerability.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2025-66261: CWE-78 Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.
AI-Powered Analysis
Technical Analysis
CVE-2025-66261 is a critical unauthenticated OS command injection vulnerability affecting multiple versions (30 through 7000) of the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A. The vulnerability exists in the /var/tdf/restore_settings.php endpoint, where the 'name' parameter received via HTTP GET is URL-decoded and passed directly to the PHP exec() function without any input validation or escaping. This allows an attacker to inject arbitrary shell commands using metacharacters such as ';', '|', or '&&', leading to remote code execution with the privileges of the web server user. The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The affected devices are specialized FM transmitters used in broadcasting infrastructure, which may be deployed in critical communication environments. Although no public exploits have been reported yet, the straightforward exploitation method and critical impact make this a high-priority vulnerability for affected organizations to address promptly.
Potential Impact
The vulnerability allows unauthenticated remote attackers to execute arbitrary OS commands on affected Mozart FM Transmitter devices, potentially leading to full compromise of the device. This can result in unauthorized access to sensitive broadcast configurations, disruption or manipulation of FM transmission services, and use of the compromised device as a foothold for lateral movement within organizational networks. For European organizations, especially broadcasters and telecom operators relying on these devices, this could lead to significant operational outages, reputational damage, and regulatory compliance issues under frameworks like GDPR if personal data or critical infrastructure is impacted. The ability to execute commands as the web server user could also facilitate installation of persistent malware or pivoting attacks against other network assets. Given the criticality and ease of exploitation, the threat poses a severe risk to the availability and integrity of broadcast services and associated communication infrastructure in Europe.
Mitigation Recommendations
1. Immediately restrict network access to the /var/tdf/restore_settings.php endpoint by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Disable the restore_settings.php functionality if it is not essential for operations until a patch is available. 3. Monitor network traffic and device logs for suspicious requests containing shell metacharacters or unusual command patterns targeting the 'name' parameter. 4. Engage with DB Electronica Telecomunicazioni S.p.A. to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they are released. 5. Implement web application firewall (WAF) rules to detect and block command injection attempts targeting this endpoint. 6. Conduct thorough security assessments of all Mozart FM Transmitter devices in use to identify any signs of compromise. 7. Establish incident response plans specific to broadcast infrastructure to quickly contain and remediate potential exploitation. 8. Educate operational technology (OT) and IT teams on the risks and detection methods related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:58.504Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692654b3ca41832e1e5d9fb3
Added to database: 11/26/2025, 1:15:31 AM
Last enriched: 12/3/2025, 4:28:00 AM
Last updated: 1/10/2026, 10:11:20 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.