Overview
The vulnerability, CVE-2025-51040, impacts the web management system of Electrolink’s FM/DAB/TV Transmitter. It allows unauthorized access via the /FrameSetCore.html endpoint, affecting a variety of Electrolink transmitters. This vulnerability is critical as it can potentially lead to a system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-51040
Severity: High (7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized access, potential system compromise, and data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Electrolink 500W Medium DAB Transmitter Web | v01.09, v01.08, v01.07
Electrolink 1kW Medium DAB Transmitter Web | v01.09, v01.08, v01.07
Electrolink 2kW Medium DAB Transmitter Web | v01.09, v01.08, v01.07
Electrolink Display | v1.4, v1.2
How the Exploit Works
The vulnerability allows unauthorized access via a specific endpoint. Attackers can exploit this flaw by sending specially crafted requests to the /FrameSetCore.html endpoint. This can bypass security mechanisms and grant them unauthorized access to the system, potentially leading to data leakage or full system compromise.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited. This could be a sample HTTP request, shell command, or pseudocode:
GET /FrameSetCore.html HTTP/1.1
Host: target.example.com
This request could potentially grant the attacker unauthorized access to the system. As always, this example code is provided for educational purposes and should never be used maliciously.

