Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xmrh-m77m-3pg7

Опубликовано: 04 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.4

Описание

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.

EPSS

Процентиль: 46%
0.00234
Низкий

9.4 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
14 дней назад

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.

CVSS3: 9.6
fstec
4 месяца назад

Уязвимость микропрограммного обеспечения усилителей беспроводного сигнала Aitemi M300 (MT02), связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 46%
0.00234
Низкий

9.4 Critical

CVSS4

Дефекты

CWE-78