Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66261: CWE-78 Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter

0
Critical
VulnerabilityCVE-2025-66261cvecve-2025-66261cwe-78
Published: Wed Nov 26 2025 (11/26/2025, 00:49:38 UTC)
Source: CVE Database V5
Vendor/Project: DB Electronica Telecomunicazioni S.p.A.
Product: Mozart FM Transmitter

Description

Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.

AI-Powered Analysis

AILast updated: 11/26/2025, 01:31:18 UTC

Technical Analysis

CVE-2025-66261 is an unauthenticated OS command injection vulnerability identified in the Mozart FM Transmitter product line by DB Electronica Telecomunicazioni S.p.A. The vulnerability resides in the restore_settings.php script located at /var/tdf/restore_settings.php. Specifically, the 'name' parameter received via HTTP GET is URL-decoded using urldecode() and then passed directly into the PHP exec() function without any sanitization or validation. This unsafe handling allows attackers to inject arbitrary shell commands by including shell metacharacters such as ';', '|', or '&&' within the 'name' parameter. Because the endpoint does not require authentication, any remote attacker with network access to the device's web interface can exploit this vulnerability to execute arbitrary commands with the privileges of the web server user. The affected versions include a broad range of Mozart FM Transmitter models (30 through 7000), indicating a widespread issue across the product line. The vulnerability has a CVSS 4.0 score of 9.9, reflecting its critical nature due to the ease of exploitation (no authentication or user interaction required), high impact on confidentiality, integrity, and availability, and the absence of any security controls mitigating the attack. While no public exploits or patches are currently known, the risk of remote code execution on critical broadcast equipment poses a significant threat to operational continuity and security. Attackers could leverage this flaw to disrupt FM transmission services, manipulate broadcast content, or use compromised devices as pivot points within organizational networks.

Potential Impact

For European organizations, particularly broadcasters and telecommunications providers using Mozart FM Transmitters, this vulnerability presents a severe risk. Exploitation could lead to unauthorized remote code execution, allowing attackers to disrupt FM broadcast services, alter transmitted content, or cause denial of service. This could damage organizational reputation, violate regulatory compliance related to broadcast integrity, and potentially impact public safety communications. Additionally, compromised devices could serve as entry points for lateral movement within corporate networks, threatening broader IT infrastructure. The criticality is heightened in countries with dense broadcast networks or where these devices are widely deployed. The lack of authentication and ease of exploitation mean that attackers can operate remotely without prior access, increasing the likelihood of attacks. The absence of known patches or mitigations further exacerbates the risk, necessitating immediate defensive measures. Operational disruptions could have cascading effects on media outlets, emergency broadcast systems, and telecommunications services across Europe.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include restricting network access to the transmitter's web management interface through network segmentation and firewall rules, allowing only trusted administrative hosts to connect. Employ VPNs or secure tunnels for remote management to prevent exposure to the public internet. Monitor network traffic for suspicious requests targeting restore_settings.php with unusual 'name' parameter values containing shell metacharacters. Implement web application firewalls (WAFs) with custom rules to detect and block command injection patterns. Disable or restrict the restore_settings.php endpoint if not required for normal operations. Conduct thorough audits of device configurations and logs to detect any signs of compromise. Engage with the vendor for updates or patches and plan for timely firmware upgrades once available. Additionally, consider deploying intrusion detection systems (IDS) tuned for command injection attempts and maintain up-to-date asset inventories to identify all affected devices. Training operational staff to recognize signs of exploitation and establishing incident response plans specific to broadcast infrastructure compromise are also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2025-11-26T00:21:58.504Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692654b3ca41832e1e5d9fb3

Added to database: 11/26/2025, 1:15:31 AM

Last enriched: 11/26/2025, 1:31:18 AM

Last updated: 11/26/2025, 6:02:52 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats