CVE-2025-34152
CRITICAL EXPLOITED NUCLEIShenzhen Aitemi M300 Wi-Fi Repeater - Command Injection
Title source: llmDescription
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
Exploits (3)
metasploit
WORKING POC
GOOD
by Valentin Lobstein · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/aitemi_m300_time_rce.rb
Nuclei Templates (1)
Shenzhen Aitemi M300 Wi-Fi Repeater – Unauthenticated Remote Command Execution via `time` Parameter
CRITICALVERIFIEDby Chocapikk,DhiyaneshDk
Shodan:
http.favicon.hash:-741058468 "lighttpd/1.4.32"
FOFA:
icon_hash="-741058468" && server=="lighttpd/1.4.32"
References (3)
Scores
CVSS v4
9.4
EPSS
0.1553
EPSS Percentile
94.7%
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Details
VulnCheck KEV
2025-09-15
CWE
CWE-78
Status
published
Products (1)
Shenzhen Aitemi E Commerce Co. Ltd./M300 Wi-Fi Repeater
Published
Aug 07, 2025
Tracked Since
Feb 18, 2026