Cyber Posture

CVE-2025-63228

CriticalPublic PoC

Published: 18 November 2025

Published
18 November 2025
Modified
08 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0088 75.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The Mozart FM Transmitter web management interface on version WEBMOZZI-00287, contains an unauthenticated file upload vulnerability in the /upload_file.php endpoint. An attacker can exploit this by sending a crafted POST request with a malicious file (e.g., a PHP webshell) to…

more

the server. The uploaded file is stored in the /upload/ directory, enabling remote code execution and full system compromise.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of all information inputs, directly preventing acceptance of malicious files like PHP webshells via the /upload_file.php endpoint.

prevent

AC-3 enforces approved authorizations, requiring authentication for the unauthenticated /upload_file.php endpoint to block remote exploitation.

prevent

SI-9 restricts classes of information inputs, limiting file uploads to safe types and preventing dangerous PHP files from being stored in the /upload/ directory.

Security SummaryAI

CVE-2025-63228 is an unauthenticated file upload vulnerability in the web management interface of the Mozart FM Transmitter, specifically version WEBMOZZI-00287. The flaw resides in the /upload_file.php endpoint, which fails to properly validate or restrict uploaded files, allowing malicious payloads such as PHP webshells to be processed and stored in the /upload/ directory. This issue, published on 2025-11-18, is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.

An unauthenticated attacker with network access to the affected interface can exploit the vulnerability by sending a crafted POST request containing a malicious file to the /upload_file.php endpoint. Successful exploitation stores the file in the /upload/ directory, enabling remote code execution on the server and potentially leading to full system compromise, including unauthorized access to sensitive data and control over the device.

Mitigation details and further analysis are available in the referenced resources, including a research repository with proof-of-concept at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63228_Mozart_FM_Transmitter_Unauthenticated_File_Upload and the vendor site at https://www.dbbroadcast.com/. Security practitioners should review these for patch availability or workarounds specific to the Mozart FM Transmitter.

Details

CWE(s)

Affected Products

dbbroadcast
mozart next 100 firmware
all versions
dbbroadcast
mozart next 1000 firmware
all versions
dbbroadcast
mozart next 2000 firmware
all versions
dbbroadcast
mozart next 30 firmware
all versions
dbbroadcast
mozart next 300 firmware
all versions
dbbroadcast
mozart next 3000 firmware
all versions
dbbroadcast
mozart next 3500 firmware
all versions
dbbroadcast
mozart next 50 firmware
all versions
dbbroadcast
mozart next 500 firmware
all versions
dbbroadcast
mozart next 6000 firmware
all versions
+12 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unauthenticated file upload vulnerability in the web management interface enables exploitation of a public-facing application (T1190) and deployment of web shells like PHP webshells for remote code execution (T1100).

References