CVE-2025-34150 PUBLISHED

Shenzhen Aitemi M300 Wi-Fi Repeater PPPoE Username Command Injection

Assigner: VulnCheck
Reserved: 15.04.2025 Published: 07.08.2025 Updated: 07.08.2025

The PPPoE configuration interface of the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) is vulnerable to command injection via the 'user' parameter. Input is processed unsafely during network setup, allowing attackers to execute arbitrary system commands with root privileges.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor Shenzhen Aitemi E Commerce Co. Ltd.
Product M300 Wi-Fi Repeater
Versions Default: unaffected
  • Version * is affected

Credits

  • Valentin Lobstein (Chocapikk) finder
  • Jared Brits (K3ysTr0K3R) finder
  • Semih Y. (r00tm4st3r) finder
  • Dinesh Aswin S. (esistdini) finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE

Impacts

  • CAPEC-88 OS Command Injection