Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 05 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:synway:smg_gateway_management_software:-:*:*:*:*:*:*:* |
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Synway
Synway smg Gateway Management Software |
|
| Vendors & Products |
Synway
Synway smg Gateway Management Software |
Thu, 30 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and interpolated directly into a sed command without sanitization. An unauthenticated remote attacker can inject arbitrary shell commands by submitting a POST request with crafted radius_address, radius_address2, shared_secret2, source_ip, timeout, or retry parameters along with save=1 and enable_radius=1 to achieve remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 (UTC). | |
| Title | Synway SMG Gateway Management Software OS Command Injection via radius_address | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T18:06:54.755Z
Reserved: 2026-04-29T15:53:17.791Z
Link: CVE-2025-71284
Updated: 2026-04-30T18:06:43.140Z
Status : Analyzed
Published: 2026-04-30T17:16:25.630
Modified: 2026-05-05T18:09:10.380
Link: CVE-2025-71284
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:30:16Z