Description

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.

INFO

Published Date :

2025-08-04T17:34:59.434Z

Last Modified :

2025-08-05T15:56:37.006Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2025-34147 vulnerability.

Vendors Products
Shenzhen Aitemi
  • M300 Wifi Repeater
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-34147.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability