CVE-2025-66252
📋 TL;DR
This vulnerability allows attackers to cause a denial of service (DoS) by triggering an infinite loop in Mozart FM Transmitter software when file deletion fails. An attacker can exploit this by targeting immutable files or files without proper permissions, causing the system to become unresponsive. All users of affected DB Electronica Telecomunicazioni Mozart FM Transmitter versions are impacted.
💻 Affected Systems
- DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
📦 What is this software?
Mozart Dds Next 1000 Firmware by Dbbroadcast
Mozart Dds Next 2000 Firmware by Dbbroadcast
Mozart Dds Next 3000 Firmware by Dbbroadcast
Mozart Dds Next 3500 Firmware by Dbbroadcast
Mozart Dds Next 6000 Firmware by Dbbroadcast
Mozart Dds Next 7000 Firmware by Dbbroadcast
⚠️ Risk & Real-World Impact
Worst Case
Complete system unavailability requiring manual intervention or reboot, potentially disrupting FM broadcasting operations.
Likely Case
Service degradation or temporary unavailability of the FM transmitter web interface and control functions.
If Mitigated
Minimal impact with proper access controls and monitoring in place to detect and respond to DoS attempts.
🎯 Exploit Status
Exploitation requires network access to the vulnerable endpoint but no authentication. Simple HTTP request can trigger the infinite loop.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: Yes
Instructions:
1. Contact DB Electronica Telecomunicazioni for patch information. 2. Apply any available vendor patches. 3. Restart affected services after patching.
🔧 Temporary Workarounds
Restrict File System Access
linuxLimit write/delete permissions to prevent unlink() failures on critical files.
chmod 444 /path/to/immutable/files
chattr +i /path/to/critical/files
Network Access Control
linuxRestrict access to the vulnerable endpoint using firewall rules.
iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate FM transmitter systems from untrusted networks.
- Deploy rate limiting and DoS protection mechanisms at network perimeter.
🔍 How to Verify
Check if Vulnerable:
Check if status_contents.php exists and contains while loop with unlink() without proper error handling.
Check Version:
Check device web interface or contact vendor for version information.
Verify Fix Applied:
Verify that while loop in status_contents.php has proper error handling or has been removed.
📡 Detection & Monitoring
Log Indicators:
- Repeated unlink() failure messages
- High CPU usage on transmitter system
- Web server process hanging
Network Indicators:
- Multiple requests to status_contents.php endpoint
- Unusual traffic patterns to transmitter management interface
SIEM Query:
source="transmitter_logs" AND (message="*unlink*" OR message="*status_contents*") | stats count by src_ip