PT-2025-31839 · Shenzhen Aitemi · Aitemi M300 Wi-Fi Repeater

Jared Brits

+2

·

Published

2025-08-04

·

Updated

2025-08-05

·

CVE-2025-34147

CVSS v4.0
9.4
VectorAV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02)

Description:

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater. When configuring the device in Extender mode via its captive portal, the `extap2g` SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-34147

Affected Products

Aitemi M300 Wi-Fi Repeater