Skip to content

Commit 1fe1512

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 1314f5d commit 1fe1512

File tree

1 file changed

+58
-0
lines changed

1 file changed

+58
-0
lines changed

db/modules_metadata_base.json

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68023,6 +68023,64 @@
6802368023
"session_types": false,
6802468024
"needs_cleanup": null
6802568025
},
68026+
"exploit_linux/http/aitemi_m300_time_rce": {
68027+
"name": "Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (time param)",
68028+
"fullname": "exploit/linux/http/aitemi_m300_time_rce",
68029+
"aliases": [],
68030+
"rank": 400,
68031+
"disclosure_date": "2025-08-07",
68032+
"type": "exploit",
68033+
"author": [
68034+
"Valentin Lobstein"
68035+
],
68036+
"description": "This module exploits an unauthenticated remote command injection vulnerability\n in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The vulnerability\n lies in the 'time' parameter of the time configuration endpoint, which is passed\n unsanitized to a shell command executed via the `date -s` mechanism. The injection\n executes with root privileges, without requiring authentication, reboot, or\n network reconfiguration.",
68037+
"references": [
68038+
"URL-https://chocapikk.com/posts/2025/when-a-wifi-name-gives-you-root-part-two/",
68039+
"CVE-2025-34152"
68040+
],
68041+
"platform": "Unix",
68042+
"arch": "cmd, mipsbe",
68043+
"rport": 80,
68044+
"autofilter_ports": [
68045+
80,
68046+
8080,
68047+
443,
68048+
8000,
68049+
8888,
68050+
8880,
68051+
8008,
68052+
3000,
68053+
8443
68054+
],
68055+
"autofilter_services": [
68056+
"http",
68057+
"https"
68058+
],
68059+
"targets": [
68060+
"Unix Command",
68061+
"Linux Meterpreter MIPSBE (MAY crash HTTP worker)"
68062+
],
68063+
"mod_time": "2025-08-14 16:37:13 +0000",
68064+
"path": "/modules/exploits/linux/http/aitemi_m300_time_rce.rb",
68065+
"is_install_path": true,
68066+
"ref_name": "linux/http/aitemi_m300_time_rce",
68067+
"check": true,
68068+
"post_auth": false,
68069+
"default_credential": false,
68070+
"notes": {
68071+
"Stability": [
68072+
"crash-service-down"
68073+
],
68074+
"Reliability": [
68075+
"repeatable-session"
68076+
],
68077+
"SideEffects": [
68078+
"ioc-in-logs"
68079+
]
68080+
},
68081+
"session_types": false,
68082+
"needs_cleanup": null
68083+
},
6802668084
"exploit_linux/http/alcatel_omnipcx_mastercgi_exec": {
6802768085
"name": "Alcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution",
6802868086
"fullname": "exploit/linux/http/alcatel_omnipcx_mastercgi_exec",

0 commit comments

Comments
 (0)