CVE-2025-34147: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
AI Analysis
Technical Summary
CVE-2025-34147 is an unauthenticated OS command injection vulnerability affecting all versions of the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The flaw exists in the device’s captive portal configuration interface when setting the extap2g SSID field in Extender mode. This SSID value is directly inserted into a shell script executed at reboot without proper sanitization or escaping of special characters. An attacker within Wi-Fi range can exploit this by crafting a malicious SSID that injects arbitrary shell commands. These commands execute with root privileges during device reboot, enabling full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS 4.0 vector indicates the attack requires adjacent network access (Wi-Fi range), no privileges or user interaction, and results in high confidentiality, integrity, and availability impact with high scope and security requirements. Although no public exploits are known yet, the vulnerability’s nature and ease of exploitation make it highly dangerous. The device’s role as a network extender means compromise could allow attackers to intercept, manipulate, or disrupt network traffic and potentially pivot into connected networks. The lack of authentication and user interaction requirements significantly lowers the barrier for attackers. The vulnerability was reserved in April 2025 and published in August 2025, with no patches currently available, increasing urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of the M300 Wi-Fi Repeater can lead to full device takeover, allowing attackers to execute arbitrary commands as root. This can result in interception or manipulation of network traffic, disruption of Wi-Fi services, and use of the device as a foothold for lateral movement into corporate or critical infrastructure networks. Sensitive data confidentiality and integrity may be compromised, and availability of network services can be disrupted. Organizations relying on these repeaters for extending Wi-Fi coverage in offices, industrial sites, or public spaces face increased exposure. The unauthenticated nature of the attack and requirement only for Wi-Fi proximity make it feasible for attackers to exploit from nearby locations without physical access or credentials. This is particularly concerning for organizations in dense urban environments or with exposed Wi-Fi networks. The absence of patches means that mitigation must rely on network controls and device configuration changes until vendor updates are available.
Mitigation Recommendations
1. Immediately segment networks to isolate Shenzhen Aitemi M300 devices from sensitive internal networks, limiting attacker pivot opportunities. 2. Disable Extender mode on the M300 devices if not strictly necessary, as the vulnerability is triggered only in this mode. 3. Restrict physical and Wi-Fi access to trusted users and devices; implement strong Wi-Fi authentication and monitoring to detect rogue access points or suspicious SSID changes. 4. Monitor device logs and network traffic for unusual reboot events or unexpected shell command executions. 5. Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to detect malicious SSID broadcasts or injection attempts. 6. Engage with Shenzhen Aitemi for firmware updates or patches and apply them promptly once available. 7. Consider replacing vulnerable devices with alternatives that have stronger security postures if immediate patching is not possible. 8. Educate IT and security teams about the vulnerability and signs of exploitation to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-34147: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater
Description
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-34147 is an unauthenticated OS command injection vulnerability affecting all versions of the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The flaw exists in the device’s captive portal configuration interface when setting the extap2g SSID field in Extender mode. This SSID value is directly inserted into a shell script executed at reboot without proper sanitization or escaping of special characters. An attacker within Wi-Fi range can exploit this by crafting a malicious SSID that injects arbitrary shell commands. These commands execute with root privileges during device reboot, enabling full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS 4.0 vector indicates the attack requires adjacent network access (Wi-Fi range), no privileges or user interaction, and results in high confidentiality, integrity, and availability impact with high scope and security requirements. Although no public exploits are known yet, the vulnerability’s nature and ease of exploitation make it highly dangerous. The device’s role as a network extender means compromise could allow attackers to intercept, manipulate, or disrupt network traffic and potentially pivot into connected networks. The lack of authentication and user interaction requirements significantly lowers the barrier for attackers. The vulnerability was reserved in April 2025 and published in August 2025, with no patches currently available, increasing urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of the M300 Wi-Fi Repeater can lead to full device takeover, allowing attackers to execute arbitrary commands as root. This can result in interception or manipulation of network traffic, disruption of Wi-Fi services, and use of the device as a foothold for lateral movement into corporate or critical infrastructure networks. Sensitive data confidentiality and integrity may be compromised, and availability of network services can be disrupted. Organizations relying on these repeaters for extending Wi-Fi coverage in offices, industrial sites, or public spaces face increased exposure. The unauthenticated nature of the attack and requirement only for Wi-Fi proximity make it feasible for attackers to exploit from nearby locations without physical access or credentials. This is particularly concerning for organizations in dense urban environments or with exposed Wi-Fi networks. The absence of patches means that mitigation must rely on network controls and device configuration changes until vendor updates are available.
Mitigation Recommendations
1. Immediately segment networks to isolate Shenzhen Aitemi M300 devices from sensitive internal networks, limiting attacker pivot opportunities. 2. Disable Extender mode on the M300 devices if not strictly necessary, as the vulnerability is triggered only in this mode. 3. Restrict physical and Wi-Fi access to trusted users and devices; implement strong Wi-Fi authentication and monitoring to detect rogue access points or suspicious SSID changes. 4. Monitor device logs and network traffic for unusual reboot events or unexpected shell command executions. 5. Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to detect malicious SSID broadcasts or injection attempts. 6. Engage with Shenzhen Aitemi for firmware updates or patches and apply them promptly once available. 7. Consider replacing vulnerable devices with alternatives that have stronger security postures if immediate patching is not possible. 8. Educate IT and security teams about the vulnerability and signs of exploitation to enable rapid incident response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.564Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6890f23bad5a09ad00e27de8
Added to database: 8/4/2025, 5:47:39 PM
Last enriched: 12/1/2025, 5:23:48 PM
Last updated: 12/18/2025, 12:51:20 PM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14618: CWE-862 Missing Authorization in listingthemes Sweet Energy Efficiency
MediumCVE-2025-14437: CWE-532 Insertion of Sensitive Information into Log File in wpmudev Hummingbird Performance – Cache & Page Speed Optimization for Core Web Vitals | Critical CSS | Minify CSS | Defer CSS Javascript | CDN
HighCVE-2025-14277: CWE-918 Server-Side Request Forgery (SSRF) in bdthemes Prime Slider – Addons for Elementor
MediumCVE-2025-13110: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce
MediumCVE-2025-10910: CWE-639 Authorization Bypass Through User-Controlled Key in Govee H6056
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.