CVE-2025-63227
moderate-risk
Published 2025-11-18
The Mozart FM Transmitter web management interface on version WEBMOZZI-00287, contains an unrestricted file upload vulnerability in the /patch.php endpoint. An attacker with administrative credentials can upload arbitrary files (e.g., PHP webshells), which are stored in the /patch/ directory. This allows the attacker to execute arbitrary commands on the server, potentially leading to full system compromise.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Mozart Next 100 Firmware
Mozart Next 1000 Firmware
Mozart Next 2000 Firmware
Mozart Next 30 Firmware
Mozart Next 300 Firmware
Mozart Next 3000 Firmware
Mozart Next 3500 Firmware
Mozart Next 50 Firmware
Mozart Next 500 Firmware
Mozart Next 6000 Firmware
Mozart Next 7000 Firmware
Mozart Dds Next 30 Firmware
Mozart Dds Next 50 Firmware
Mozart Dds Next 100 Firmware
Mozart Dds Next 300 Firmware
Mozart Dds Next 500 Firmware
Mozart Dds Next 1000 Firmware
Mozart Dds Next 2000 Firmware
Mozart Dds Next 3000 Firmware
Mozart Dds Next 3500 Firmware
Affected Vendors
References (2)
46
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
0/34 · Minimal
Exposure
20/34 · Moderate