CVE-2025-63228
high-risk
Published 2025-11-18
The Mozart FM Transmitter web management interface on version WEBMOZZI-00287, contains an unauthenticated file upload vulnerability in the /upload_file.php endpoint. An attacker can exploit this by sending a crafted POST request with a malicious file (e.g., a PHP webshell) to the server. The uploaded file is stored in the /upload/ directory, enabling remote code execution and full system compromise.
Do I need to act?
-
0.68% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Mozart Next 100 Firmware
Mozart Next 1000 Firmware
Mozart Next 2000 Firmware
Mozart Next 30 Firmware
Mozart Next 300 Firmware
Mozart Next 3000 Firmware
Mozart Next 3500 Firmware
Mozart Next 50 Firmware
Mozart Next 500 Firmware
Mozart Next 6000 Firmware
Mozart Next 7000 Firmware
Mozart Dds Next 30 Firmware
Mozart Dds Next 50 Firmware
Mozart Dds Next 100 Firmware
Mozart Dds Next 300 Firmware
Mozart Dds Next 500 Firmware
Mozart Dds Next 1000 Firmware
Mozart Dds Next 2000 Firmware
Mozart Dds Next 3000 Firmware
Mozart Dds Next 3500 Firmware
Affected Vendors
References (2)
54
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
20/34 · Moderate