Overview
CVE-2025-66254 identifies a critical unauthenticated arbitrary file deletion vulnerability affecting DB Elettronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, and 7000. This vulnerability allows attackers to delete arbitrary files on the system without requiring any authentication. This poses a significant risk to the integrity and availability of the affected devices.
Technical Details
The vulnerability lies in the upgrade_contents.php script located at /var/www/upgrade_contents.php. The deleteupgrade parameter is used to specify the file to be deleted. However, the script lacks proper authentication and input sanitization, allowing an attacker to manipulate the deleteupgrade parameter to delete any file within the /var/www/upload/ directory. Crucially, there are no restrictions on the file extension or path sanitization implemented, which significantly widens the attack surface.
An attacker can exploit this vulnerability by crafting a malicious HTTP request to the upgrade_contents.php script with the deleteupgrade parameter set to the path of the file they wish to delete. For example:
GET /upgrade_contents.php?deleteupgrade=important_system_file.txt HTTP/1.1
Host: vulnerable-transmitter
This would delete /var/www/upload/important_system_file.txt, assuming it exists.
CVSS Analysis
Due to the nature of the vulnerability, a proper CVSS score is needed to properly assess its danger. Since the information has not been properly assessed a CVSS score has not been provided.
Possible Impact
The impact of this vulnerability is severe. An attacker could:
- Delete critical system files, rendering the FM transmitter unusable.
- Remove configuration files, leading to misconfiguration or malfunction of the device.
- Disrupt broadcasting services, causing significant downtime and financial losses.
- Delete uploaded firmware files, preventing legitimate upgrades.
Mitigation and Patch Steps
The following mitigation steps are recommended:
- Apply the official patch: Contact DB Elettronica to obtain and apply the latest security patch for your specific Mozart FM Transmitter model.
- Implement Authentication: Require authentication for accessing the
upgrade_contents.phpscript. Only authorized users should be able to access this functionality. - Input Sanitization: Implement robust input sanitization on the
deleteupgradeparameter. Verify that the input is a valid file name and that the path is within the allowed/var/www/upload/directory. Prevent path traversal attempts (e.g., “..” sequences). - Principle of Least Privilege: Ensure that the web server process runs with the minimal necessary privileges.
- Network Segmentation: Isolate the FM transmitter on a separate network segment to limit the potential impact of a compromise.
- Web Application Firewall (WAF): Implement a Web Application Firewall to detect and block malicious requests targeting the
upgrade_contents.phpscript.
