CVE-2025-66258

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious JavaScript into the Mozart FM Transmitter's patchlist.xml file through crafted filenames. When the system processes this XML file, the JavaScript executes in users' browsers, enabling stored cross-site scripting attacks. All users of affected DB Electronica Telecomunicazioni Mozart FM Transmitter versions are at risk.

💻 Affected Systems

Products:
  • DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter
Versions: 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: All listed versions are vulnerable when using the patchlist.xml functionality. The vulnerability requires file upload capabilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take full control of the transmitter system, manipulate broadcast content, or deploy ransomware on connected systems.

🟠

Likely Case

Attackers would typically steal session cookies to hijack user accounts, deface web interfaces, or redirect users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented, and impact would be limited to failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires file upload access to the transmitter system. The vulnerability is well-documented with example payloads available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Monitor vendor website for security updates. Consider implementing workarounds or replacing vulnerable systems.

🔧 Temporary Workarounds

Input Validation for Filenames

all

Implement strict validation on all filename inputs to reject any containing XML special characters or JavaScript patterns.

Implement server-side validation: reject filenames containing <, >, &, ', ", (, ), {, }, [, ], ;, =, onerror, onload, javascript:, alert(), script, img, src

XML Output Encoding

all

Ensure all user-controlled data inserted into XML files is properly encoded for XML context.

Use XML encoding functions: replace & with &amp;, < with &lt;, > with &gt;, " with &quot;, ' with &apos;

🧯 If You Can't Patch

  • Disable file upload functionality to the transmitter system if not required for operations.
  • Implement a web application firewall (WAF) with XSS protection rules to block malicious payloads.

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a file with name containing XML/JavaScript payload (e.g., '<img src=x onerror=alert(1)>.bin'). Check if payload appears unencoded in patchlist.xml and executes when viewed.

Check Version:

Check transmitter web interface or system documentation for version information.

Verify Fix Applied:

Test with same malicious filename - it should be rejected or properly encoded in the XML output with no JavaScript execution.

📡 Detection & Monitoring

Log Indicators:

  • File upload logs showing filenames containing XML/JavaScript patterns
  • Web server logs showing requests to patchlist.xml with unusual parameters

Network Indicators:

  • HTTP requests containing filenames with XML/JavaScript payloads
  • Unusual spikes in requests to the transmitter web interface

SIEM Query:

source="web_logs" AND (filename CONTAINS "<script>" OR filename CONTAINS "onerror=" OR filename CONTAINS "javascript:")

🔗 References

📤 Share & Export