Unauthenticated OS Command Injection (restore_settings...
Critical severity
Unreviewed
Published
Nov 26, 2025
to the GitHub Advisory Database
•
Updated Dec 3, 2025
Description
Published by the National Vulnerability Database
Nov 26, 2025
Published to the GitHub Advisory Database
Nov 26, 2025
Last updated
Dec 3, 2025
Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution.
The
/var/tdf/restore_settings.phpendpoint passes user-controlled$_GET["name"]parameter throughurldecode()directly intoexec()without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (;,|,&&, etc.) to achieve unauthenticated remote code execution as the web server user.References