CVE-2025-34152
Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via Time Parameter
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
Existe una vulnerabilidad de inyección de comandos del sistema operativo no autenticados en el repetidor Wi-Fi Shenzhen Aitemi M300 (modelo de hardware MT02) a través del parámetro "time" del endpoint "/protocol.csp?". La entrada se procesa mediante el comando interno "-s" sin reiniciar ni interrumpir el servicio HTTP. A diferencia de otros puntos de inyección, este vector permite la vulneración remota sin activar cambios visibles en la configuración.
Shenzhen Aitemi M300 Wi-Fi Repeater suffers from a remote code execution vulnerability.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-04-15 CVE Reserved
- 2025-08-07 CVE Published
- 2025-08-07 CVE Updated
- 2025-08-07 First Exploit
- 2025-08-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
- CAPEC-88: OS Command Injection
References (3)
URL | Tag | Source |
---|---|---|
https://www.aliexpress.us/item/3256806767641280.html | Product |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/207963 | 2025-08-08 | |
https://chocapikk.com/posts/2025/when-a-wifi-name-gives-you-root-part-two | 2025-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
- | - | - | - | - |