Skip to main content

CVE-2025-34152: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Aitemi E Commerce Co. Ltd. M300 Wi-Fi Repeater

Critical
VulnerabilityCVE-2025-34152cvecve-2025-34152cwe-78
Published: Thu Aug 07 2025 (08/07/2025, 16:44:59 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Aitemi E Commerce Co. Ltd.
Product: M300 Wi-Fi Repeater

Description

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

AI-Powered Analysis

AILast updated: 08/07/2025, 17:03:15 UTC

Technical Analysis

CVE-2025-34152 is a critical unauthenticated OS command injection vulnerability affecting the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The vulnerability exists in the handling of the 'time' parameter within the '/protocol.csp?' HTTP endpoint. Specifically, the input provided to this parameter is passed directly to the internal date '-s' command without proper sanitization or neutralization of special characters, allowing an attacker to inject arbitrary OS commands. This injection occurs without requiring authentication, user interaction, or causing visible configuration changes or service disruptions, making it stealthy and potentially more dangerous. The vulnerability leverages CWE-78, which relates to improper neutralization of special elements used in OS commands. The CVSS v4.0 score is 9.4 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation over the network without privileges or user interaction. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a prime target for attackers aiming to gain remote code execution on affected devices. The M300 Wi-Fi Repeater is likely used in various environments to extend wireless network coverage, and compromise could lead to network pivoting, data interception, or persistent footholds within organizational networks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Shenzhen Aitemi M300 Wi-Fi Repeaters in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and use of the compromised device as a launchpad for further attacks. Given the stealthy nature of the exploit (no visible configuration changes or service disruption), detection and incident response may be delayed, increasing the window of opportunity for attackers. Organizations in sectors with high security requirements such as finance, healthcare, critical infrastructure, and government could face severe confidentiality breaches, operational disruptions, and reputational damage. Additionally, compromised repeaters could be used to exfiltrate sensitive data or launch attacks against other connected systems, amplifying the threat.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Shenzhen Aitemi M300 Wi-Fi Repeaters from critical network segments to limit lateral movement if compromised. 2. Monitor network traffic for unusual activity originating from or targeting these devices, focusing on HTTP requests to '/protocol.csp?' endpoints with suspicious 'time' parameter values. 3. Implement strict input validation and filtering at network perimeter devices or proxies to block malformed or suspicious requests targeting the vulnerable endpoint. 4. Since no official patch is currently available, consider replacing affected devices with models from vendors with timely security updates. 5. Employ host-based intrusion detection systems (HIDS) on critical network segments to detect anomalous command execution patterns. 6. Conduct regular vulnerability assessments and penetration testing focusing on IoT and network edge devices to identify similar weaknesses. 7. Maintain an inventory of all deployed Shenzhen Aitemi devices and restrict administrative access to trusted personnel only. 8. Engage with the vendor for updates or patches and subscribe to vulnerability advisories to apply fixes promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.565Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6894d8b1ad5a09ad00fb13f0

Added to database: 8/7/2025, 4:47:45 PM

Last enriched: 8/7/2025, 5:03:15 PM

Last updated: 8/31/2025, 1:14:03 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats