An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
History

Tue, 05 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater
Vendors & Products Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater

Mon, 04 Aug 2025 17:45:00 +0000

Type Values Removed Values Added
Description An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
Title Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via SSID
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-04T17:34:59.434Z

Updated: 2025-08-05T15:56:37.006Z

Reserved: 2025-04-15T19:15:22.564Z

Link: CVE-2025-34147

cve-icon Vulnrichment

Updated: 2025-08-05T15:56:34.553Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-04T18:15:34.653

Modified: 2025-08-05T14:34:17.327

Link: CVE-2025-34147

cve-icon Redhat

No data.