Cyber Posture

CVE-2025-66255

CriticalPublic PoC

Published: 26 November 2025

Published
26 November 2025
Modified
03 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Unauthenticated Arbitrary File Upload (upgrade_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Missing signature validation allows uploading malicious firmware packages. The firmware…

more

upgrade endpoint in `upgrade_contents.php` accepts arbitrary file uploads without validating file headers, cryptographic signatures, or enforcing .tgz format requirements, allowing malicious firmware injection. This endpoint also subsequently provides ways for arbitrary file uploads and subsequent remote code execution

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires firmware components to be digitally signed and enforces signature validation, directly addressing the missing cryptographic signature checks in the upgrade endpoint.

prevent

Mandates validation of uploaded file headers, format requirements, and content consistency, preventing arbitrary malicious file uploads disguised as firmware.

preventdetect

Implements integrity verification mechanisms for firmware and software, detecting and blocking unauthorized changes from injected malicious firmware packages.

Security SummaryAI

CVE-2025-66255 is an unauthenticated arbitrary file upload vulnerability in the upgrade_contents.php endpoint of DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter devices, affecting versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, and 7000. The endpoint fails to validate file headers, cryptographic signatures, or enforce .tgz format requirements, enabling attackers to upload malicious firmware packages. This missing signature validation leads to firmware injection, with the endpoint also facilitating subsequent arbitrary file uploads and remote code execution. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWEs 345 (Insufficient Verification of Data Authenticity) and 434 (Unrestricted Upload of File with Dangerous Type).

Any unauthenticated attacker with network access to the affected device can exploit this vulnerability due to its low attack complexity and lack of privileges required. By sending a crafted request to upgrade_contents.php, the attacker can upload arbitrary files disguised as firmware, bypassing all validation checks. Successful exploitation allows injection of malicious firmware, enabling full remote code execution on the device with high impacts on confidentiality, integrity, and availability.

References for this vulnerability include details published at https://www.abdulmhsblog.com/posts/webfmvulns/, which documents the issue but does not specify vendor-provided patches or mitigation steps in the available information.

Details

CWE(s)

Affected Products

dbbroadcast
mozart next 3000 firmware
all versions
dbbroadcast
mozart next 3500 firmware
all versions
dbbroadcast
mozart next 50 firmware
all versions
dbbroadcast
mozart next 500 firmware
all versions
dbbroadcast
mozart next 6000 firmware
all versions
dbbroadcast
mozart next 7000 firmware
all versions
dbbroadcast
mozart next 100 firmware
all versions
dbbroadcast
mozart next 1000 firmware
all versions
dbbroadcast
mozart next 2000 firmware
all versions
dbbroadcast
mozart next 30 firmware
all versions
+12 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1542.001 System Firmware Stealth
Adversaries may modify system firmware to persist on systems.
Why these techniques?

Unauthenticated arbitrary file upload in public-facing upgrade endpoint enables exploitation of public-facing application (T1190) and facilitates malicious firmware injection for persistence (T1542.001), leading to RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References