Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34149: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater

0
Critical
VulnerabilityCVE-2025-34149cvecve-2025-34149cwe-78
Published: Thu Aug 07 2025 (08/07/2025, 16:45:18 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Aitemi E Commerce Co. Ltd.
Product: M300 Wi-Fi Repeater

Description

A command injection vulnerability affects the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) during WPA2 configuration. The 'key' parameter is interpreted directly by the system shell, enabling attackers to execute arbitrary commands as root. Exploitation requires no authentication and can be triggered during wireless setup.

AI-Powered Analysis

AILast updated: 12/04/2025, 17:02:35 UTC

Technical Analysis

CVE-2025-34149 is an OS command injection vulnerability classified under CWE-78, affecting the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The vulnerability arises because the device's WPA2 configuration process accepts a 'key' parameter that is directly interpreted by the system shell without proper sanitization or neutralization of special characters. This improper input handling enables an attacker to inject arbitrary shell commands that execute with root privileges on the device. Notably, exploitation does not require authentication or user interaction, making it remotely exploitable during the wireless setup phase. The vulnerability impacts all versions of the M300 repeater, indicating a systemic flaw in the device firmware. The CVSS 4.0 base score of 9.4 reflects a critical severity, with high impact on confidentiality, integrity, and availability, and low attack complexity. Although no public exploits have been reported yet, the ease of exploitation and root-level command execution potential make this a high-risk vulnerability. The device’s role as a Wi-Fi repeater means compromise could allow attackers to intercept, manipulate, or disrupt network traffic, or use the device as a foothold for lateral movement within networks. The lack of authentication requirement during setup further exacerbates the risk, especially in environments where device setup interfaces are exposed or insufficiently protected.

Potential Impact

For European organizations, the impact of CVE-2025-34149 can be substantial. Compromise of the M300 Wi-Fi repeater could lead to unauthorized network access, interception of sensitive communications, and potential disruption of wireless connectivity. Given the root-level command execution, attackers could install persistent malware, pivot to other network segments, or exfiltrate confidential data. Critical infrastructure, enterprise networks, and public Wi-Fi deployments using these devices are particularly vulnerable. The vulnerability could undermine trust in network security, cause operational downtime, and lead to regulatory compliance issues under GDPR if personal data is exposed. The ease of exploitation without authentication increases the attack surface, especially in environments where these repeaters are deployed in semi-public or poorly secured locations. Additionally, the potential for attackers to manipulate WPA2 settings could weaken wireless security configurations, further exposing networks to additional attacks.

Mitigation Recommendations

Immediate mitigation involves obtaining and applying firmware updates from Shenzhen Aitemi that address the command injection flaw. If no patch is currently available, organizations should restrict access to the device’s wireless setup interface by isolating the device on a separate management VLAN or using network access controls to limit connections to trusted administrators only. Disabling remote setup features or wireless configuration interfaces until a patch is applied can reduce exposure. Network monitoring should be enhanced to detect anomalous commands or traffic patterns originating from the M300 repeaters. Organizations should also consider replacing affected devices with more secure alternatives if timely patches are unavailable. Implementing strong physical security controls to prevent unauthorized local access to the devices is advisable. Finally, conducting a thorough network audit to identify all deployed Shenzhen Aitemi M300 devices will help in prioritizing remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.564Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6894d8b1ad5a09ad00fb13e4

Added to database: 8/7/2025, 4:47:45 PM

Last enriched: 12/4/2025, 5:02:35 PM

Last updated: 1/18/2026, 2:21:06 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats