POC详情: c40cfc14d0497838f69d4ef9cf5aaff3ccb8fc6b

来源
关联漏洞
标题: Itemir M300 Wi-Fi Repeater 安全漏洞 (CVE-2025-34152)
描述:Itemir M300 Wi-Fi Repeater是中国艾特米(Itemir)公司的一个无线中继器。 Itemir M300 Wi-Fi Repeater存在安全漏洞,该漏洞源于time参数未清理,可能导致未经验证的远程命令注入攻击。
描述
Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2025-34152)
介绍
# ⚠️ CVE-2025-34152 – Shenzhen Aitemi M300 Wi-Fi Repeater RCE

## 🚨 Overview

Shenzhen Aitemi M300 Wi-Fi Repeater is affected by an **unauthenticated remote code execution (RCE)**.

* No login required
* Does **not** reboot the device
* Can be exploited remotely

---

## 🛠 Vulnerable Versions

| Version | Status                  |
| ------- | ----------------------- |
| 1.0.x   | ❌ Vulnerable            |
| 1.1.x   | ❌ Vulnerable            |
| 1.2.x   | ❌ Vulnerable            |
| 2.0.x   | ⚠️ Check Vendor Updates |

---

## 💡 Remediation

* Update to the latest firmware from vendor
* Restrict management interface access (LAN only)
* Enable firewall rules to block WAN access
* Monitor logs for suspicious requests

---


---

## 🧪 PoC (Lab Use Only)

> ⚠️ Do **not** use on public devices, only in a controlled lab environment.

```bash
go run CVE-2025-34152.go
```

---
## 🔗 References

* [CVE Details](https://www.cvedetails.com/cve/CVE-2025-34152)
* Vendor Advisory: Shenzhen Aitemi official site
* Exploit analysis: Security blogs

文件快照

[4.0K] /data/pocs/c40cfc14d0497838f69d4ef9cf5aaff3ccb8fc6b ├── [2.0K] CVE-2025-34152.go ├── [6.9K] LICENSE └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。