CVE-2025-66261
Published: 26 November 2025
Description
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution.…
more
The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validating and sanitizing the user-controlled $_GET['name'] parameter before passing it to exec() to block shell metacharacters and prevent command injection.
Limits permitted actions without identification or authentication, preventing unauthenticated remote access to the vulnerable /var/tdf/restore_settings.php endpoint.
Identifies, reports, and corrects the specific command injection flaw in restore_settings.php to eliminate the insecure urldecode() and exec() usage.
Security SummaryAI
CVE-2025-66261, published on 2025-11-26, is an unauthenticated OS command injection vulnerability (CWE-78) in the restore_settings.php component of DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter devices. It affects versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, and 7000. The vulnerable endpoint at /var/tdf/restore_settings.php takes the user-controlled $_GET["name"] parameter, applies urldecode() to it, and passes the result directly into the exec() PHP function without validation or escaping, enabling command injection.
An unauthenticated attacker (PR:N) with network access (AV:N) can exploit this low-complexity (AC:L) vulnerability by crafting a malicious URL-decoded "name" parameter containing shell metacharacters such as ;, |, or &&. This allows arbitrary command execution as the web server user, with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 9.8.
Details on mitigation, patches, or advisories are available in the referenced disclosure at https://www.abdulmhsblog.com/posts/webfmvulns/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated OS command injection in a public-facing web endpoint (restore_settings.php) directly enables T1190 (Exploit Public-Facing Application) and facilitates arbitrary Unix shell command execution via T1059.004 (Unix Shell) through unescaped exec() usage.