An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 21 Nov 2025 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Aitemi m300
CPEs ccpe:2.3:h:shenzhen_aitemi:m300:-:*:*:*:*:*:*:* cpe:2.3:h:shenzhen_aitemi:m300:-:*:*:*:*:*:*:*
Vendors & Products Shenzhen Aitemi m300

Thu, 20 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs ccpe:2.3:h:shenzhen_aitemi:m300:-:*:*:*:*:*:*:*

Tue, 04 Nov 2025 22:30:00 +0000


Tue, 12 Aug 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater
Vendors & Products Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater

Thu, 07 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 Aug 2025 17:00:00 +0000

Type Values Removed Values Added
Description An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
Title Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via Time Parameter
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-21T00:47:24.679Z

Reserved: 2025-04-15T19:15:22.565Z

Link: CVE-2025-34152

cve-icon Vulnrichment

Updated: 2025-08-07T18:39:44.157Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-07T17:15:29.183

Modified: 2025-11-04T23:15:36.367

Link: CVE-2025-34152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-12T07:49:23Z