CVE-2025-34152

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
CVSS

No CVSS.

Configurations

No configuration.

History

04 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://www.vulncheck.com/advisories/shenzhen-aitemi-m300-wifi-repeater-os-command-injection-via-time-parameter -

Information

Published : 2025-08-07 17:15

Updated : 2025-11-04 23:15


NVD link : CVE-2025-34152

Mitre link : CVE-2025-34152

CVE.ORG link : CVE-2025-34152


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')