CVE-2025-63228

9.8 CRITICAL

📋 TL;DR

The Mozart FM Transmitter web management interface contains an unauthenticated file upload vulnerability that allows attackers to upload malicious files like PHP webshells without authentication. This enables remote code execution and full system compromise. All systems running the affected version are vulnerable.

💻 Affected Systems

Products:
  • Mozart FM Transmitter
Versions: WEBMOZZI-00287
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface component of the FM transmitter system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining root/admin privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Webshell deployment leading to data theft, lateral movement within the network, and use as a pivot point for further attacks.

🟢

If Mitigated

Limited impact due to network segmentation, but still potential for initial foothold in the affected system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a crafted HTTP POST request to the vulnerable endpoint with a malicious file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dbbroadcast.com/

Restart Required: No

Instructions:

1. Contact vendor for patch availability 2. Apply patch when available 3. Verify the /upload_file.php endpoint is secured

🔧 Temporary Workarounds

Block Unauthenticated Access to Upload Endpoint

all

Use web server configuration or firewall rules to block unauthenticated access to /upload_file.php

# Apache: <Location /upload_file.php> Require valid-user </Location>
# Nginx: location /upload_file.php { deny all; }

Disable Web Management Interface

all

Temporarily disable the web interface if not required for operations

# System-specific commands to disable web service

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the device from critical systems
  • Deploy a WAF with file upload filtering rules to block malicious uploads

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a test file to http://[target]/upload_file.php without authentication. If successful, system is vulnerable.

Check Version:

Check web interface version in admin panel or via HTTP headers

Verify Fix Applied:

Verify that unauthenticated file uploads to /upload_file.php are rejected with proper authentication requirements.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /upload_file.php from unauthenticated sources
  • File creation in /upload/ directory with suspicious extensions (.php, .jsp, .asp)

Network Indicators:

  • Unusual outbound connections from the device
  • HTTP POST requests with file uploads to the vulnerable endpoint

SIEM Query:

source="web_logs" AND (uri="/upload_file.php" AND method="POST") AND NOT user_agent="legitimate_client"

🔗 References

📤 Share & Export