An unauthenticated OS command injection vulnerability...
Critical severity
Unreviewed
Published
Aug 4, 2025
to the GitHub Advisory Database
•
Updated Aug 4, 2025
Description
Published by the National Vulnerability Database
Aug 4, 2025
Published to the GitHub Advisory Database
Aug 4, 2025
Last updated
Aug 4, 2025
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
References