Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34148: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater

0
Critical
VulnerabilityCVE-2025-34148cvecve-2025-34148cwe-78
Published: Thu Aug 07 2025 (08/07/2025, 16:45:26 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Aitemi E Commerce Co. Ltd.
Product: M300 Wi-Fi Repeater

Description

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.

AI-Powered Analysis

AILast updated: 11/27/2025, 16:38:46 UTC

Technical Analysis

CVE-2025-34148 is an OS command injection vulnerability classified under CWE-78, found in the Shenzhen Aitemi M300 Wi-Fi Repeater (model MT02). The vulnerability exists because the device's firmware improperly handles the 'ssid' parameter during configuration in WISP mode, passing it unsanitized to system-level shell scripts. This allows an unauthenticated attacker within Wi-Fi range to inject arbitrary shell commands that execute with root privileges on the device. The lack of input validation or sanitization means that crafted SSID values can manipulate the underlying operating system commands, leading to full device compromise. The vulnerability affects all versions of the product, indicating a systemic flaw in the firmware design. The CVSS 4.0 score of 9.4 highlights the critical nature of this vulnerability, with attack vector being adjacent network (Wi-Fi range), no required privileges or user interaction, and a high impact on confidentiality, integrity, and availability. Although no exploits are currently reported in the wild, the ease of exploitation and root-level access make this a severe threat. The vulnerability could be leveraged to pivot into internal networks, intercept or manipulate traffic, or deploy persistent malware on the device. The absence of vendor patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying Shenzhen Aitemi M300 Wi-Fi Repeaters in enterprise, industrial, or critical infrastructure environments. An attacker within Wi-Fi range can gain root access to the device, potentially using it as a foothold to infiltrate internal networks, intercept sensitive communications, or disrupt network availability. This could lead to data breaches, espionage, or service outages. The vulnerability undermines network perimeter security and may facilitate lateral movement to other connected systems. Given the device’s role in extending Wi-Fi coverage, compromised repeaters could be used to launch man-in-the-middle attacks or serve as persistent access points for attackers. The impact is heightened in environments with weak network segmentation or where these devices are deployed in sensitive locations. The lack of authentication and user interaction requirements means even casual attackers or insiders could exploit this flaw. The overall effect threatens confidentiality, integrity, and availability of organizational IT assets.

Mitigation Recommendations

Immediate mitigation involves disabling WISP mode on affected devices to prevent exploitation of the vulnerable code path. Organizations should isolate Shenzhen Aitemi M300 repeaters on segmented network zones with strict access controls to limit attacker movement. Monitoring Wi-Fi networks for suspicious SSID broadcasts or anomalous device behavior can help detect exploitation attempts. Since no official patches are available yet, organizations should engage with the vendor for firmware updates and apply them promptly once released. If replacement is feasible, consider substituting affected devices with models from vendors with stronger security track records. Employ network-level protections such as wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block malicious Wi-Fi activity. Regularly audit and inventory network devices to identify vulnerable hardware. Educate staff about the risks of rogue Wi-Fi configurations and enforce policies restricting unauthorized device configuration. Finally, implement strong network segmentation to contain potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.564Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6894d8b1ad5a09ad00fb13e0

Added to database: 8/7/2025, 4:47:45 PM

Last enriched: 11/27/2025, 4:38:46 PM

Last updated: 12/4/2025, 9:52:01 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats