CVE-2025-71284 PUBLISHED

Synway SMG Gateway Management Software OS Command Injection via radius_address

Assigner: VulnCheck
Reserved: 29.04.2026 Published: 30.04.2026 Updated: 30.04.2026

Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and interpolated directly into a sed command without sanitization. An unauthenticated remote attacker can inject arbitrary shell commands by submitting a POST request with crafted radius_address, radius_address2, shared_secret2, source_ip, timeout, or retry parameters along with save=1 and enable_radius=1 to achieve remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 (UTC).

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Synway Information Engineering Co., Ltd.
Product Synway SMG Gateway Management Software
Versions Default: affected
  • Version 0 is affected

Credits

  • The Shadowserver Foundation finder

References

Problem Types

  • Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) CWE