Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66262: CWE-22 Arbitrary File Overwrite via Tar Extraction Path Traversal in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter

0
Critical
VulnerabilityCVE-2025-66262cvecve-2025-66262cwe-22
Published: Wed Nov 26 2025 (11/26/2025, 00:50:55 UTC)
Source: CVE Database V5
Vendor/Project: DB Electronica Telecomunicazioni S.p.A.
Product: Mozart FM Transmitter

Description

Arbitrary File Overwrite via Tar Extraction Path Traversal in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Tar extraction with -C / allow arbitrary file overwrite via crafted archive. The `restore_mozzi_memories.sh` script extracts user-controlled tar archives with `-C /` flag, depositing contents to the filesystem root without path validation. When combined with the unauthenticated file upload vulnerabilities (CVE-01, CVE-06, CVE-07), attackers can craft malicious .tgz archives containing path-traversed filenames (e.g., `etc/shadow`, `var/www/index.php`) to overwrite critical system files in writable directories, achieving full system compromise.

AI-Powered Analysis

AILast updated: 11/26/2025, 01:31:04 UTC

Technical Analysis

CVE-2025-66262 is a critical security vulnerability classified under CWE-22 (Path Traversal) affecting DB Electronica Telecomunicazioni S.p.A.'s Mozart FM Transmitter devices across a wide range of versions (30 through 7000). The root cause lies in the restore_mozzi_memories.sh script, which extracts tar archives using the '-C /' option, directing extracted files to the root filesystem without validating the archive's internal file paths. This lack of path sanitization allows an attacker to craft malicious tar archives containing filenames with path traversal sequences (e.g., ../../etc/shadow), enabling arbitrary file overwrite on the target system. The vulnerability is exacerbated by the presence of unauthenticated file upload vulnerabilities (referenced as CVE-01, CVE-06, CVE-07), which allow attackers to upload these crafted archives without authentication or user interaction. By overwriting critical system files such as /etc/shadow or web server files (e.g., /var/www/index.php), attackers can achieve full system compromise, including privilege escalation and persistent backdoors. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/AU:N) reflects network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. While no public exploits are currently known, the vulnerability's characteristics make it highly exploitable and dangerous. The affected product line is specialized hardware used in FM transmission, indicating a niche but critical target, especially for broadcasting infrastructure.

Potential Impact

For European organizations, particularly broadcasters, telecom operators, and infrastructure providers using Mozart FM Transmitter devices, this vulnerability poses severe risks. Successful exploitation can lead to full system compromise, enabling attackers to overwrite critical system files, disrupt broadcasting services, manipulate transmitted content, or gain persistent access to internal networks. The confidentiality of sensitive data, including authentication credentials stored in /etc/shadow, can be compromised, leading to further lateral movement within networks. Integrity and availability of transmission services can be severely impacted, causing outages or misinformation dissemination. Given the critical role of FM transmitters in public communication and emergency broadcasting, exploitation could have cascading effects on public safety and information reliability. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of targeted attacks or automated exploitation campaigns. The potential for reputational damage and regulatory penalties under European cybersecurity and data protection laws (e.g., NIS Directive, GDPR) further elevates the impact.

Mitigation Recommendations

1. Immediately restrict or disable unauthenticated file upload functionalities associated with the affected devices until patches are available. 2. Implement strict validation and sanitization of all uploaded archive contents, ensuring no path traversal sequences are present before extraction. 3. Modify or replace the restore_mozzi_memories.sh script to avoid extracting archives directly to the root filesystem; instead, extract to a controlled, isolated directory with limited permissions. 4. Employ application-layer firewalls or intrusion prevention systems to detect and block suspicious tar archive uploads or path traversal attempts. 5. Monitor device logs and network traffic for unusual file upload activities or unexpected modifications to critical system files. 6. Coordinate with DB Electronica Telecomunicazioni S.p.A. for timely security patches or firmware updates addressing this vulnerability. 7. Conduct thorough security audits of all Mozart FM Transmitter devices in use, verifying configuration and patch status. 8. Where possible, segment transmitter devices on isolated network segments to limit attacker lateral movement if compromised. 9. Educate operational staff on the risks and signs of exploitation attempts related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2025-11-26T00:21:58.504Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692654b3ca41832e1e5d9fb6

Added to database: 11/26/2025, 1:15:31 AM

Last enriched: 11/26/2025, 1:31:04 AM

Last updated: 11/26/2025, 7:23:50 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats