CVE-2025-66261: CWE-78 Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.
AI Analysis
Technical Summary
CVE-2025-66261 is an unauthenticated OS command injection vulnerability identified in the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the restore_settings.php script located at /var/tdf/restore_settings.php. Specifically, the 'name' parameter received via HTTP GET is URL-decoded using urldecode() and then passed directly into the PHP exec() function without any sanitization or validation. This unsafe handling allows attackers to inject arbitrary shell commands by including shell metacharacters such as ';', '|', or '&&' within the 'name' parameter. Because the endpoint does not require authentication, any remote attacker with network access to the device's web interface can exploit this vulnerability to execute arbitrary commands with the privileges of the web server user. The affected versions include a broad range of Mozart FM Transmitter models (30 through 7000), indicating a widespread issue across the product line. The vulnerability has a CVSS 4.0 score of 9.9, reflecting its critical nature due to the ease of exploitation (no authentication or user interaction required), high impact on confidentiality, integrity, and availability, and the absence of any security controls mitigating the attack. While no public exploits or patches are currently known, the risk of remote code execution on critical broadcast equipment poses a significant threat to operational continuity and security. Attackers could leverage this flaw to disrupt FM transmission services, manipulate broadcast content, or use compromised devices as pivot points within organizational networks.
Potential Impact
For European organizations, particularly broadcasters and telecommunications providers using Mozart FM Transmitters, this vulnerability presents a severe risk. Exploitation could lead to unauthorized remote code execution, allowing attackers to disrupt FM broadcast services, alter transmitted content, or cause denial of service. This could damage organizational reputation, violate regulatory compliance related to broadcast integrity, and potentially impact public safety communications. Additionally, compromised devices could serve as entry points for lateral movement within corporate networks, threatening broader IT infrastructure. The criticality is heightened in countries with dense broadcast networks or where these devices are widely deployed. The lack of authentication and ease of exploitation mean that attackers can operate remotely without prior access, increasing the likelihood of attacks. The absence of known patches or mitigations further exacerbates the risk, necessitating immediate defensive measures. Operational disruptions could have cascading effects on media outlets, emergency broadcast systems, and telecommunications services across Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include restricting network access to the transmitter's web management interface through network segmentation and firewall rules, allowing only trusted administrative hosts to connect. Employ VPNs or secure tunnels for remote management to prevent exposure to the public internet. Monitor network traffic for suspicious requests targeting restore_settings.php with unusual 'name' parameter values containing shell metacharacters. Implement web application firewalls (WAFs) with custom rules to detect and block command injection patterns. Disable or restrict the restore_settings.php endpoint if not required for normal operations. Conduct thorough audits of device configurations and logs to detect any signs of compromise. Engage with the vendor for updates or patches and plan for timely firmware upgrades once available. Additionally, consider deploying intrusion detection systems (IDS) tuned for command injection attempts and maintain up-to-date asset inventories to identify all affected devices. Training operational staff to recognize signs of exploitation and establishing incident response plans specific to broadcast infrastructure compromise are also recommended.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-66261: CWE-78 Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Description
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.
AI-Powered Analysis
Technical Analysis
CVE-2025-66261 is an unauthenticated OS command injection vulnerability identified in the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the restore_settings.php script located at /var/tdf/restore_settings.php. Specifically, the 'name' parameter received via HTTP GET is URL-decoded using urldecode() and then passed directly into the PHP exec() function without any sanitization or validation. This unsafe handling allows attackers to inject arbitrary shell commands by including shell metacharacters such as ';', '|', or '&&' within the 'name' parameter. Because the endpoint does not require authentication, any remote attacker with network access to the device's web interface can exploit this vulnerability to execute arbitrary commands with the privileges of the web server user. The affected versions include a broad range of Mozart FM Transmitter models (30 through 7000), indicating a widespread issue across the product line. The vulnerability has a CVSS 4.0 score of 9.9, reflecting its critical nature due to the ease of exploitation (no authentication or user interaction required), high impact on confidentiality, integrity, and availability, and the absence of any security controls mitigating the attack. While no public exploits or patches are currently known, the risk of remote code execution on critical broadcast equipment poses a significant threat to operational continuity and security. Attackers could leverage this flaw to disrupt FM transmission services, manipulate broadcast content, or use compromised devices as pivot points within organizational networks.
Potential Impact
For European organizations, particularly broadcasters and telecommunications providers using Mozart FM Transmitters, this vulnerability presents a severe risk. Exploitation could lead to unauthorized remote code execution, allowing attackers to disrupt FM broadcast services, alter transmitted content, or cause denial of service. This could damage organizational reputation, violate regulatory compliance related to broadcast integrity, and potentially impact public safety communications. Additionally, compromised devices could serve as entry points for lateral movement within corporate networks, threatening broader IT infrastructure. The criticality is heightened in countries with dense broadcast networks or where these devices are widely deployed. The lack of authentication and ease of exploitation mean that attackers can operate remotely without prior access, increasing the likelihood of attacks. The absence of known patches or mitigations further exacerbates the risk, necessitating immediate defensive measures. Operational disruptions could have cascading effects on media outlets, emergency broadcast systems, and telecommunications services across Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include restricting network access to the transmitter's web management interface through network segmentation and firewall rules, allowing only trusted administrative hosts to connect. Employ VPNs or secure tunnels for remote management to prevent exposure to the public internet. Monitor network traffic for suspicious requests targeting restore_settings.php with unusual 'name' parameter values containing shell metacharacters. Implement web application firewalls (WAFs) with custom rules to detect and block command injection patterns. Disable or restrict the restore_settings.php endpoint if not required for normal operations. Conduct thorough audits of device configurations and logs to detect any signs of compromise. Engage with the vendor for updates or patches and plan for timely firmware upgrades once available. Additionally, consider deploying intrusion detection systems (IDS) tuned for command injection attempts and maintain up-to-date asset inventories to identify all affected devices. Training operational staff to recognize signs of exploitation and establishing incident response plans specific to broadcast infrastructure compromise are also recommended.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2025-11-26T00:21:58.504Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692654b3ca41832e1e5d9fb3
Added to database: 11/26/2025, 1:15:31 AM
Last enriched: 11/26/2025, 1:31:18 AM
Last updated: 11/26/2025, 6:02:52 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55174: CWE-684 Incorrect Provision of Specified Functionality in KDE Skanpage
LowCVE-2025-66235
UnknownCVE-2025-66234
UnknownCVE-2025-66233
UnknownCVE-2025-66232
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.