CVE-2025-63227

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with administrative credentials to upload arbitrary files to the Mozart FM Transmitter web management interface. The uploaded files can be executed on the server, potentially leading to remote code execution and full system compromise. Organizations using the affected version of Mozart FM Transmitter are at risk.

💻 Affected Systems

Products:
  • Mozart FM Transmitter
Versions: WEBMOZZI-00287
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative credentials to exploit. The vulnerability exists in the web management interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining persistent access, data exfiltration, and use of the system as a pivot point into the network.

🟠

Likely Case

Webshell deployment leading to command execution, data theft, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent attacker from reaching the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials but is straightforward once credentials are obtained. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dbbroadcast.com/

Restart Required: No

Instructions:

Check vendor website for security updates. If no patch is available, implement workarounds immediately.

🔧 Temporary Workarounds

Restrict Access to Management Interface

linux

Block external access to the web management interface using firewall rules.

iptables -A INPUT -p tcp --dport [management_port] -j DROP

Disable /patch.php Endpoint

all

Remove or rename the vulnerable patch.php file to prevent file uploads.

mv /path/to/patch.php /path/to/patch.php.disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the FM transmitter from critical systems
  • Enforce strong password policies and multi-factor authentication for administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check if patch.php exists in the web root and if version is WEBMOZZI-00287

Check Version:

Check web interface or device documentation for version information

Verify Fix Applied:

Verify patch.php is removed/disabled and test file upload functionality is blocked

📡 Detection & Monitoring

Log Indicators:

  • File uploads to /patch.php
  • Unusual file creations in /patch/ directory
  • POST requests to patch.php with file uploads

Network Indicators:

  • HTTP POST requests to /patch.php with file upload content
  • Unusual outbound connections from the FM transmitter

SIEM Query:

source="web_logs" AND (uri="/patch.php" OR method="POST" AND uri CONTAINS "patch")

🔗 References

📤 Share & Export