Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q595-fccr-c7x4

Опубликовано: 26 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.9
CVSS3: 9.8

Описание

Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The /var/tdf/restore_settings.php endpoint passes user-controlled $_GET["name"] parameter through urldecode() directly into exec() without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (;, |, &&, etc.) to achieve unauthenticated remote code execution as the web server user.

Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The /var/tdf/restore_settings.php endpoint passes user-controlled $_GET["name"] parameter through urldecode() directly into exec() without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (;, |, &&, etc.) to achieve unauthenticated remote code execution as the web server user.

EPSS

Процентиль: 70%
0.00632
Низкий

9.9 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 9.8
nvd
2 месяца назад

Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `urldecode()` directly into `exec()` without validation or escaping. Attackers can inject arbitrary shell commands using metacharacters (`;`, `|`, `&&`, etc.) to achieve unauthenticated remote code execution as the web server user.

EPSS

Процентиль: 70%
0.00632
Низкий

9.9 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-78