CVE-2025-71284

Published Apr 30, 2026

Last updated 4 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-71284 describes an OS command injection vulnerability found within the Synway SMG Gateway Management Software. Specifically, the flaw resides in the RADIUS configuration endpoint, located at `/en/9-2radius.php`. The vulnerability occurs because the `radius_address` POST parameter, along with other related parameters such as `radius_address2`, `shared_secret2`, `source_ip`, `timeout`, and `retry`, are split and directly interpolated into a `sed` command without proper sanitization. This allows an unauthenticated remote attacker to inject arbitrary shell commands by sending a crafted POST request with these parameters, along with `save=1` and `enable_radius=1`, ultimately leading to remote code execution. Evidence of exploitation was first observed by the Shadowserver Foundation on July 11, 2025.

Description
Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and interpolated directly into a sed command without sanitization. An unauthenticated remote attacker can inject arbitrary shell commands by submitting a POST request with crafted radius_address, radius_address2, shared_secret2, source_ip, timeout, or retry parameters along with save=1 and enable_radius=1 to achieve remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 (UTC).
Source
disclosure@vulncheck.com
NVD status
Awaiting Analysis

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.3
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

disclosure@vulncheck.com
CWE-78

Social media

Hype score
Not currently trending
  1. CVE-2025-71284 Unauthenticated Remote Code Execution via OS Command Injection in Synway SMG Gateway Management Software https://t.co/MwvOr1y76A

    @VulmonFeeds

    30 Apr 2026

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨*CVE* CVE-2025-71284 Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_addre… https://t.co/QdpLAlIwM7 ----- Traducción: CVE-2025-71284 Syn… https://t.co/utmtNg

    @infoflowcloud

    30 Apr 2026

    75 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CVE-2025-71284 Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_addre… https://t.co/z6mfmvM4RZ

    @CVEnew

    30 Apr 2026

    141 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨 CVE-2025-71284 — CVSS 9.8/10 ██████████ Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration... Severity: CRITICAL Patch now. #cybersecurity #CVE https://t.co/05pxPNN9hg

    @OrizonCyber

    30 Apr 2026

    82 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  5. 🚨 CRITICAL — CVE-2025-71284 Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpo… CVSS 9.8 🔴 No patch yet Full analysis → https://t.co/hDBulUHWtl #HP #CyberSecurity #InfoSec

    @KaitanSecurity

    30 Apr 2026

    75 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes