CVE-2025-66261
Published: 26 November 2025
Summary
CVE-2025-66261 is a critical-severity OS Command Injection (CWE-78) vulnerability in Dbbroadcast Mozart Next 100 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validating and sanitizing the user-controlled $_GET['name'] parameter before passing it to exec() to block shell metacharacters and prevent command injection.
Limits permitted actions without identification or authentication, preventing unauthenticated remote access to the vulnerable /var/tdf/restore_settings.php endpoint.
Identifies, reports, and corrects the specific command injection flaw in restore_settings.php to eliminate the insecure urldecode() and exec() usage.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated OS command injection in a public-facing web endpoint (restore_settings.php) directly enables T1190 (Exploit Public-Facing Application) and facilitates arbitrary Unix shell command execution via T1059.004 (Unix Shell) through unescaped exec() usage.
NVD Description
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution.…
more
The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.
Deeper analysisAI
CVE-2025-66261, published on 2025-11-26, is an unauthenticated OS command injection vulnerability (CWE-78) in the restore_settings.php component of DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter devices. It affects versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, and 7000. The vulnerable endpoint at /var/tdf/restore_settings.php takes the user-controlled $_GET["name"] parameter, applies urldecode() to it, and passes the result directly into the exec() PHP function without validation or escaping, enabling command injection.
An unauthenticated attacker (PR:N) with network access (AV:N) can exploit this low-complexity (AC:L) vulnerability by crafting a malicious URL-decoded "name" parameter containing shell metacharacters such as ;, |, or &&. This allows arbitrary command execution as the web server user, with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 9.8.
Details on mitigation, patches, or advisories are available in the referenced disclosure at https://www.abdulmhsblog.com/posts/webfmvulns/.
Details
- CWE(s)