PostgreSQL SQL Injection (status_sql.php) in DB...
High severity
Unreviewed
Published
Nov 26, 2025
to the GitHub Advisory Database
•
Updated Dec 3, 2025
Description
Published by the National Vulnerability Database
Nov 26, 2025
Published to the GitHub Advisory Database
Nov 26, 2025
Last updated
Dec 3, 2025
PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php.
The
status_sql.phpendpoint constructs SQL UPDATE queries by directly concatenating user-controlledsw1andsw2parameters without using parameterized queries orpg_escape_string(). While PostgreSQL'spg_execlimitations prevent stacked queries, attackers can inject subqueries for data exfiltration and leverage verbose error messages for reconnaissance.References