An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 Aug 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater
Vendors & Products Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater

Thu, 07 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 Aug 2025 17:00:00 +0000

Type Values Removed Values Added
Description An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.
Title Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via WISP SSID
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-08-07T17:51:01.750Z

Reserved: 2025-04-15T19:15:22.564Z

Link: CVE-2025-34148

cve-icon Vulnrichment

Updated: 2025-08-07T17:50:41.997Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-07T17:15:28.520

Modified: 2025-08-07T21:26:37.453

Link: CVE-2025-34148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-12T07:49:24Z