Unauthenticated OS Command Injection (start_upgrade.php)...
Critical severity
Unreviewed
Published
Nov 26, 2025
to the GitHub Advisory Database
•
Updated Dec 3, 2025
Description
Published by the National Vulnerability Database
Nov 26, 2025
Published to the GitHub Advisory Database
Nov 26, 2025
Last updated
Dec 3, 2025
Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform User input passed directly to exec() allows remote code execution via start_upgrade.php. The
/var/tdf/start_upgrade.phpendpoint passes user-controlled$_GET["filename"]directly intoexec()without sanitization or shell escaping. Attackers can inject arbitrary shell commands using metacharacters (;,|, etc.) to achieve remote code execution as the web server user (likely root).References