CVE-2025-34148

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.
CVSS

No CVSS.

Configurations

No configuration.

History

04 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://www.vulncheck.com/advisories/shenzhen-aitemi-m300-wifi-repeater-os-command-injection-via-wisp-ssid -

Information

Published : 2025-08-07 17:15

Updated : 2025-11-04 23:15


NVD link : CVE-2025-34148

Mitre link : CVE-2025-34148

CVE.ORG link : CVE-2025-34148


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')