Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Shenzhen Aitemi E Commerce Co. Ltd. | M300 Wi-Fi Repeater | * | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2025-34152) | https://github.com/Chocapikk/CVE-2025-34152 | POC Details |
| 2 | An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34152.yaml | POC Details |
| 3 | Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2025-34152) | https://github.com/kh4sh3i/CVE-2025-34152 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet