CVE-2025-34148

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.
CVSS

No CVSS.

Configurations

No configuration.

History

04 Nov 2025, 23:15

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de inyección de comandos del sistema operativo no autenticados en el repetidor Wi-Fi Shenzhen Aitemi M300 (modelo MT02). Al configurar el dispositivo en modo WISP, el parámetro 'ssid' se transfiere sin depurar a scripts del sistema. Esto permite a atacantes remotos dentro del alcance Wi-Fi inyectar comandos de shell arbitrarios que se ejecutan como root, lo que compromete completamente el dispositivo.
References
  • () https://www.vulncheck.com/advisories/shenzhen-aitemi-m300-wifi-repeater-os-command-injection-via-wisp-ssid -

07 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-07 17:15

Updated : 2025-11-04 23:15


NVD link : CVE-2025-34148

Mitre link : CVE-2025-34148

CVE.ORG link : CVE-2025-34148


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')