A command injection vulnerability affects the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) during WPA2 configuration. The 'key' parameter is interpreted directly by the system shell, enabling attackers to execute arbitrary commands as root. Exploitation requires no authentication and can be triggered during wireless setup.
History

Tue, 12 Aug 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater
Vendors & Products Shenzhen Aitemi
Shenzhen Aitemi m300 Wifi Repeater

Thu, 07 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 Aug 2025 17:00:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability affects the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) during WPA2 configuration. The 'key' parameter is interpreted directly by the system shell, enabling attackers to execute arbitrary commands as root. Exploitation requires no authentication and can be triggered during wireless setup.
Title Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via WPA2 Key
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-07T16:45:18.731Z

Updated: 2025-08-07T18:28:29.899Z

Reserved: 2025-04-15T19:15:22.564Z

Link: CVE-2025-34149

cve-icon Vulnrichment

Updated: 2025-08-07T18:28:03.691Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-07T17:15:28.700

Modified: 2025-08-07T21:26:37.453

Link: CVE-2025-34149

cve-icon Redhat

No data.