Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qfxm-2vvw-gwhp

Опубликовано: 07 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.4

Описание

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.

EPSS

Процентиль: 37%
0.0016
Низкий

9.4 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
6 месяцев назад

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.

EPSS

Процентиль: 37%
0.0016
Низкий

9.4 Critical

CVSS4

Дефекты

CWE-78