CVE-2025-34152

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
CVSS

No CVSS.

Configurations

No configuration.

History

04 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://www.vulncheck.com/advisories/shenzhen-aitemi-m300-wifi-repeater-os-command-injection-via-time-parameter -
Summary
  • (es) Existe una vulnerabilidad de inyección de comandos del sistema operativo no autenticados en el repetidor Wi-Fi Shenzhen Aitemi M300 (modelo de hardware MT02) a través del parámetro "time" del endpoint "/protocol.csp?". La entrada se procesa mediante el comando interno "-s" sin reiniciar ni interrumpir el servicio HTTP. A diferencia de otros puntos de inyección, este vector permite la vulneración remota sin activar cambios visibles en la configuración.

07 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-07 17:15

Updated : 2025-11-04 23:15


NVD link : CVE-2025-34152

Mitre link : CVE-2025-34152

CVE.ORG link : CVE-2025-34152


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')