Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Shenzhen Aitemi E Commerce Co. Ltd. | M300 Wi-Fi Repeater | * | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2025-34152) | https://github.com/Chocapikk/CVE-2025-34152 | POC Details |
| 2 | An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34152.yaml | POC Details |
| 3 | Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2025-34152) | https://github.com/kh4sh3i/CVE-2025-34152 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-34151 | Shenzhen Aitemi M300 Wi-Fi Repeater PPPoE Password Command Injection | |
| CVE-2025-34148 | Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via WISP SSID | |
| CVE-2025-34150 | Shenzhen Aitemi M300 Wi-Fi Repeater PPPoE Username Command Injection | |
| CVE-2025-34149 | Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via WPA2 Key |
No comments yet