AI description
CVE-2025-71284 describes an OS command injection vulnerability found within the Synway SMG Gateway Management Software. Specifically, the flaw resides in the RADIUS configuration endpoint, located at `/en/9-2radius.php`. The vulnerability occurs because the `radius_address` POST parameter, along with other related parameters such as `radius_address2`, `shared_secret2`, `source_ip`, `timeout`, and `retry`, are split and directly interpolated into a `sed` command without proper sanitization. This allows an unauthenticated remote attacker to inject arbitrary shell commands by sending a crafted POST request with these parameters, along with `save=1` and `enable_radius=1`, ultimately leading to remote code execution. Evidence of exploitation was first observed by the Shadowserver Foundation on July 11, 2025.
- Description
- Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and interpolated directly into a sed command without sanitization. An unauthenticated remote attacker can inject arbitrary shell commands by submitting a POST request with crafted radius_address, radius_address2, shared_secret2, source_ip, timeout, or retry parameters along with save=1 and enable_radius=1 to achieve remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 (UTC).
- Source
- disclosure@vulncheck.com
- NVD status
- Awaiting Analysis
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- disclosure@vulncheck.com
- CWE-78
- Hype score
- Not currently trending
CVE-2025-71284 Unauthenticated Remote Code Execution via OS Command Injection in Synway SMG Gateway Management Software https://t.co/MwvOr1y76A
@VulmonFeeds
30 Apr 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨*CVE* CVE-2025-71284 Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_addre… https://t.co/QdpLAlIwM7 ----- Traducción: CVE-2025-71284 Syn… https://t.co/utmtNg
@infoflowcloud
30 Apr 2026
75 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-71284 Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_addre… https://t.co/z6mfmvM4RZ
@CVEnew
30 Apr 2026
141 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-71284 — CVSS 9.8/10 ██████████ Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration... Severity: CRITICAL Patch now. #cybersecurity #CVE https://t.co/05pxPNN9hg
@OrizonCyber
30 Apr 2026
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
2 Replies
0 Quotes
🚨 CRITICAL — CVE-2025-71284 Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpo… CVSS 9.8 🔴 No patch yet Full analysis → https://t.co/hDBulUHWtl #HP #CyberSecurity #InfoSec
@KaitanSecurity
30 Apr 2026
75 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes