CVE-2025-34152 PUBLISHED

Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via Time Parameter

Assigner: VulnCheck
Reserved: 15.04.2025 Published: 07.08.2025 Updated: 07.08.2025

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor Shenzhen Aitemi E Commerce Co. Ltd.
Product M300 Wi-Fi Repeater
Versions Default: unaffected
  • Version * is affected

Credits

  • Valentin Lobstein (Chocapikk) finder
  • Jared Brits (K3ysTr0K3R) finder
  • Semih Y. (r00tm4st3r) finder
  • Dinesh Aswin S. (esistdini) finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE

Impacts

  • CAPEC-88 OS Command Injection