Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34148: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater

0
Critical
VulnerabilityCVE-2025-34148cvecve-2025-34148cwe-78
Published: Thu Aug 07 2025 (08/07/2025, 16:45:26 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Aitemi E Commerce Co. Ltd.
Product: M300 Wi-Fi Repeater

Description

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.

AI-Powered Analysis

AILast updated: 12/04/2025, 17:02:22 UTC

Technical Analysis

CVE-2025-34148 is an OS command injection vulnerability classified under CWE-78, discovered in the Shenzhen Aitemi M300 Wi-Fi Repeater (model MT02). The vulnerability occurs because the device's firmware fails to properly sanitize the 'ssid' parameter when the device is configured in WISP mode. This parameter is passed directly to system-level scripts without validation, allowing an attacker within Wi-Fi range to inject arbitrary shell commands. These commands execute with root privileges, enabling full control over the device. The attack vector requires no authentication or user interaction, making exploitation straightforward for anyone nearby. The vulnerability affects all versions of the product and has been assigned a CVSS 4.0 score of 9.4, indicating critical severity. The impact includes complete device compromise, potential network pivoting, interception or manipulation of network traffic, and disruption of network availability. No patches or firmware updates are currently available, and no exploits have been reported in the wild yet. The vulnerability highlights the risks of insecure input handling in IoT and network devices, especially those deployed in sensitive or enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for full device compromise with root privileges. Attackers can leverage this to gain persistent access to internal networks, intercept or manipulate sensitive data, disrupt network services, or use the compromised device as a foothold for further attacks. Organizations relying on Shenzhen Aitemi M300 repeaters in critical infrastructure, retail, or office environments may face operational disruptions and data breaches. The proximity-based attack vector means that attackers only need to be within Wi-Fi range, which can include public or semi-public spaces near corporate facilities. This increases the risk in urban and densely populated areas. Additionally, the lack of authentication and user interaction requirements lowers the barrier for exploitation, potentially enabling automated attacks. The absence of patches exacerbates the threat, forcing organizations to rely on network segmentation and monitoring to mitigate risk. The vulnerability could also impact supply chain security if these devices are used in managed service provider networks or third-party environments.

Mitigation Recommendations

1. Immediately identify and isolate Shenzhen Aitemi M300 Wi-Fi Repeaters within your network, especially those configured in WISP mode. 2. Restrict physical and wireless access to the devices by implementing strong Wi-Fi access controls and reducing signal leakage outside secure premises. 3. Employ network segmentation to isolate vulnerable devices from critical network segments and sensitive data. 4. Monitor network traffic for unusual patterns or command injection attempts targeting the SSID configuration interface. 5. Use wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block suspicious Wi-Fi activities near vulnerable devices. 6. Contact the vendor for firmware updates or security patches; if unavailable, consider replacing affected devices with more secure alternatives. 7. Implement strict device management policies, including disabling WISP mode if not required. 8. Educate staff about the risks of unauthorized Wi-Fi devices and encourage reporting of suspicious wireless activity. 9. Regularly audit and update device configurations to minimize exposure. 10. Consider deploying endpoint detection solutions capable of identifying anomalous device behavior indicative of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.564Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6894d8b1ad5a09ad00fb13e0

Added to database: 8/7/2025, 4:47:45 PM

Last enriched: 12/4/2025, 5:02:22 PM

Last updated: 1/18/2026, 2:12:27 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats