CVE-2025-66261

high-risk
Published 2025-11-26

Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.

Do I need to act?

-
0.72% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (20)

Mozart Next 100 Firmware
Mozart Next 1000 Firmware
Mozart Next 2000 Firmware
Mozart Next 30 Firmware
Mozart Next 300 Firmware
Mozart Next 3000 Firmware
Mozart Next 3500 Firmware
Mozart Next 50 Firmware
Mozart Next 500 Firmware
Mozart Next 6000 Firmware
Mozart Next 7000 Firmware
Mozart Dds Next 30 Firmware
Mozart Dds Next 50 Firmware
Mozart Dds Next 100 Firmware
Mozart Dds Next 300 Firmware
Mozart Dds Next 500 Firmware
Mozart Dds Next 1000 Firmware
Mozart Dds Next 2000 Firmware
Mozart Dds Next 3000 Firmware
Mozart Dds Next 3500 Firmware

Affected Vendors

54
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 2/34 · Minimal
Exposure 20/34 · Moderate