CVE-2025-34147: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
AI Analysis
Technical Summary
CVE-2025-34147 is a critical OS command injection vulnerability affecting the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The vulnerability arises from improper neutralization of special elements in the extap2g SSID field when the device is configured in Extender mode via its captive portal. Specifically, the extap2g SSID input is inserted unescaped into a shell script that runs at reboot. Because this input is not sanitized, a remote attacker within Wi-Fi range can inject arbitrary shell commands that execute with root privileges during device reboot. This leads to full system compromise, allowing the attacker to execute any commands on the device, potentially gaining persistent control or pivoting to other network assets. The vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS 4.0 base score is 9.4 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. No patches are currently available, and no known exploits have been reported in the wild yet. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws. Given the device’s role as a Wi-Fi repeater, exploitation could disrupt network connectivity or be leveraged to launch further attacks within the local network environment.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those deploying Shenzhen Aitemi M300 Wi-Fi Repeaters in office or branch environments. Successful exploitation can lead to full compromise of the repeater device, enabling attackers to intercept, manipulate, or disrupt network traffic passing through the device. This can result in data breaches, lateral movement within corporate networks, and potential disruption of business operations due to network outages. The fact that exploitation requires only proximity (Wi-Fi range) means attackers do not need network credentials or physical access, increasing the threat surface in public or semi-public environments. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face severe confidentiality and availability impacts. Additionally, compromised devices could be used as footholds for launching attacks against other internal systems or as part of botnets, amplifying the threat landscape.
Mitigation Recommendations
Immediate mitigation steps include: 1) Removing or disabling the use of the extap2g SSID configuration in Extender mode until a vendor patch is available. 2) Restricting physical and wireless access to the device by implementing strong Wi-Fi segmentation and limiting Wi-Fi range exposure, such as reducing transmit power or placing repeaters in secure locations. 3) Monitoring network traffic for unusual activity originating from the repeater device. 4) If possible, replacing Shenzhen Aitemi M300 devices with alternative hardware from vendors with timely security updates. 5) Applying network-level controls such as Wireless Intrusion Detection Systems (WIDS) to detect suspicious Wi-Fi management frames or rogue configuration attempts. 6) Regularly auditing device configurations and firmware versions to identify vulnerable devices. 7) Engaging with the vendor for patch timelines and subscribing to vulnerability notifications. Since no patches currently exist, these compensating controls are critical to reduce risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-34147: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater
Description
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-34147 is a critical OS command injection vulnerability affecting the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The vulnerability arises from improper neutralization of special elements in the extap2g SSID field when the device is configured in Extender mode via its captive portal. Specifically, the extap2g SSID input is inserted unescaped into a shell script that runs at reboot. Because this input is not sanitized, a remote attacker within Wi-Fi range can inject arbitrary shell commands that execute with root privileges during device reboot. This leads to full system compromise, allowing the attacker to execute any commands on the device, potentially gaining persistent control or pivoting to other network assets. The vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS 4.0 base score is 9.4 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. No patches are currently available, and no known exploits have been reported in the wild yet. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws. Given the device’s role as a Wi-Fi repeater, exploitation could disrupt network connectivity or be leveraged to launch further attacks within the local network environment.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those deploying Shenzhen Aitemi M300 Wi-Fi Repeaters in office or branch environments. Successful exploitation can lead to full compromise of the repeater device, enabling attackers to intercept, manipulate, or disrupt network traffic passing through the device. This can result in data breaches, lateral movement within corporate networks, and potential disruption of business operations due to network outages. The fact that exploitation requires only proximity (Wi-Fi range) means attackers do not need network credentials or physical access, increasing the threat surface in public or semi-public environments. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face severe confidentiality and availability impacts. Additionally, compromised devices could be used as footholds for launching attacks against other internal systems or as part of botnets, amplifying the threat landscape.
Mitigation Recommendations
Immediate mitigation steps include: 1) Removing or disabling the use of the extap2g SSID configuration in Extender mode until a vendor patch is available. 2) Restricting physical and wireless access to the device by implementing strong Wi-Fi segmentation and limiting Wi-Fi range exposure, such as reducing transmit power or placing repeaters in secure locations. 3) Monitoring network traffic for unusual activity originating from the repeater device. 4) If possible, replacing Shenzhen Aitemi M300 devices with alternative hardware from vendors with timely security updates. 5) Applying network-level controls such as Wireless Intrusion Detection Systems (WIDS) to detect suspicious Wi-Fi management frames or rogue configuration attempts. 6) Regularly auditing device configurations and firmware versions to identify vulnerable devices. 7) Engaging with the vendor for patch timelines and subscribing to vulnerability notifications. Since no patches currently exist, these compensating controls are critical to reduce risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.564Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6890f23bad5a09ad00e27de8
Added to database: 8/4/2025, 5:47:39 PM
Last enriched: 8/12/2025, 12:58:39 AM
Last updated: 9/15/2025, 8:42:05 AM
Views: 51
Related Threats
CVE-2025-55118: CWE-122 Heap-based Buffer Overflow in BMC Control-M/Agent
HighCVE-2025-55117: CWE-121 Stack-based Buffer Overflow in BMC Control-M/Agent
MediumCVE-2025-55116: CWE-121 Stack-based Buffer Overflow in BMC Control-M/Agent
CriticalCVE-2025-55115: CWE-23 Relative Path Traversal in BMC Control-M/Agent
CriticalCVE-2025-55114: CWE-696 Incorrect Behavior Order in BMC Control-M/Agent
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.