CVE-2025-34147

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
CVSS

No CVSS.

Configurations

No configuration.

History

05 Aug 2025, 14:34

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de inyección de comandos del sistema operativo no autenticados en el repetidor Wi-Fi Shenzhen Aitemi M300 (modelo MT02). Al configurar el dispositivo en modo extensor a través de su portal cautivo, el campo SSID de extap2g se inserta sin escape en un script de shell durante el reinicio. Esto permite a atacantes remotos dentro del alcance Wi-Fi inyectar comandos de shell arbitrarios que se ejecutan como root durante el reinicio del dispositivo, lo que compromete por completo el sistema.

04 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-04 18:15

Updated : 2025-08-05 14:34


NVD link : CVE-2025-34147

Mitre link : CVE-2025-34147

CVE.ORG link : CVE-2025-34147


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')