{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-66259","assignerOrgId":"b7efe717-a805-47cf-8e9a-921fca0ce0ce","state":"PUBLISHED","assignerShortName":"Gridware","dateReserved":"2025-11-26T00:21:33.791Z","datePublished":"2025-11-26T00:46:51.931Z","dateUpdated":"2025-11-26T15:46:56.051Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Mozart FM Transmitter","vendor":"DB Electronica Telecomunicazioni S.p.A.","versions":[{"status":"affected","version":"30"},{"status":"affected","version":"50"},{"status":"affected","version":"100"},{"status":"affected","version":"300"},{"status":"affected","version":"500"},{"status":"affected","version":"1000"},{"status":"affected","version":"2000"},{"status":"affected","version":"3000"},{"status":"affected","version":"3500"},{"status":"affected","version":"6000"},{"status":"affected","version":"7000"}]}],"credits":[{"lang":"en","type":"finder","value":"Abdul Mhanni"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Authenticated Root Remote Code Execution via improrer user input filtering in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform in main_ok.php user supplied data/hour/time is passed directly into date shell command</p>"}],"value":"Authenticated Root Remote Code Execution via improrer user input filtering in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform in main_ok.php user supplied data/hour/time is passed directly into date shell command"}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b7efe717-a805-47cf-8e9a-921fca0ce0ce","shortName":"Gridware","dateUpdated":"2025-11-26T01:02:19.064Z"},"references":[{"tags":["exploit","technical-description"],"url":"https://www.abdulmhsblog.com/posts/webfmvulns/"}],"source":{"discovery":"EXTERNAL"},"title":"Authenticated Root Remote Code Execution through improper filtering of HTTP post request parameters","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-26T15:46:50.719048Z","id":"CVE-2025-66259","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-26T15:46:56.051Z"}}]}}