Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34152: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater

0
Critical
VulnerabilityCVE-2025-34152cvecve-2025-34152cwe-78
Published: Thu Aug 07 2025 (08/07/2025, 16:44:59 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Aitemi E Commerce Co. Ltd.
Product: M300 Wi-Fi Repeater

Description

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

AI-Powered Analysis

AILast updated: 11/27/2025, 16:36:46 UTC

Technical Analysis

CVE-2025-34152 is an OS command injection vulnerability classified under CWE-78 affecting the Shenzhen Aitemi M300 Wi-Fi Repeater (model MT02). The flaw exists in the handling of the 'time' parameter on the '/protocol.csp?' HTTP endpoint, which is processed by the device’s internal date '-s' command. This improper neutralization of special elements allows an unauthenticated remote attacker to inject arbitrary OS commands. Unlike other injection points, this vector does not require authentication, user interaction, or cause visible configuration changes or service disruptions, making detection difficult. The vulnerability enables attackers to execute commands with the privileges of the device’s operating system, potentially leading to full device compromise, data exfiltration, or pivoting to internal networks. The CVSS 4.0 score of 9.4 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed. No patches or official mitigations have been published yet, and no exploits are currently known in the wild, though the risk of exploitation remains significant due to the device’s network exposure and critical role in connectivity. The vulnerability highlights the need for immediate risk assessment and protective measures in environments deploying this hardware.

Potential Impact

The impact on European organizations using the Shenzhen Aitemi M300 Wi-Fi Repeater can be severe. Successful exploitation allows attackers to execute arbitrary commands remotely without authentication, risking full device compromise. This can lead to unauthorized access to internal networks, interception or manipulation of network traffic, and potential lateral movement to other critical systems. Confidentiality is at risk due to possible data leakage; integrity can be compromised by altering device configurations or injecting malicious payloads; availability may be affected if attackers disrupt network services or use the device as a foothold for further attacks. The stealthy nature of the exploit, which does not cause visible configuration changes or service interruptions, complicates detection and response. European enterprises relying on these repeaters for network extension or IoT connectivity face increased exposure, especially in sectors with stringent data protection requirements such as finance, healthcare, and government. The absence of patches increases the window of vulnerability, necessitating immediate compensating controls to mitigate risk.

Mitigation Recommendations

Given the lack of available patches, European organizations should implement several specific mitigations: 1) Conduct a comprehensive inventory to identify all Shenzhen Aitemi M300 Wi-Fi Repeaters in use. 2) Isolate these devices on segmented network zones with strict access controls to limit exposure to untrusted networks. 3) Employ network intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous HTTP requests targeting the '/protocol.csp?' endpoint, especially those manipulating the 'time' parameter. 4) Disable or restrict remote management interfaces if not required, or enforce strong authentication and access control policies. 5) Monitor device logs and network traffic for unusual command execution patterns or unexpected outbound connections. 6) Engage with the vendor for updates or patches and plan for device replacement if no remediation is forthcoming. 7) Educate network administrators about this vulnerability and the importance of rapid incident response. 8) Consider deploying application-layer firewalls or web application firewalls (WAFs) to filter malicious payloads targeting the vulnerable endpoint. These targeted actions go beyond generic advice and address the specific exploitation vector and device context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.565Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6894d8b1ad5a09ad00fb13f0

Added to database: 8/7/2025, 4:47:45 PM

Last enriched: 11/27/2025, 4:36:46 PM

Last updated: 11/30/2025, 12:48:23 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats