Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9r22-x3wm-vrr9

Опубликовано: 07 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.4

Описание

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

EPSS

Процентиль: 95%
0.17578
Средний

9.4 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
6 месяцев назад

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

EPSS

Процентиль: 95%
0.17578
Средний

9.4 Critical

CVSS4

Дефекты

CWE-78