CVE-2025-71284: Critical RCE in Synway SMG Gateway Management Software
The National Vulnerability Database has detailed CVE-2025-71284, a critical OS command injection vulnerability in Synway SMG Gateway Management Software. Specifically, the RADIUS configuration endpoint at /en/9-2radius.php is vulnerable. The radius_address POST parameter, along with others like radius_address2, shared_secret2, source_ip, timeout, and retry, are directly interpolated into a sed command without proper sanitization.
This flaw allows an unauthenticated remote attacker to inject arbitrary shell commands by sending a crafted POST request. The impact is severe, enabling remote code execution (RCE) with a CVSS score of 9.8. The Shadowserver Foundation first observed exploitation evidence for this vulnerability on July 11, 2025.
Defenders must recognize the gravity of unauthenticated RCE. This isn’t theoretical; it’s a direct path for attackers to gain full control over affected gateways. The lack of specified affected products by the National Vulnerability Database means organizations using Synway SMG Gateway Management Software must assume they are at risk unless proven otherwise.
What This Means For You
- If your organization uses Synway SMG Gateway Management Software, immediately identify all instances. This CVE-2025-71284 is an unauthenticated RCE, meaning attackers can gain full control without credentials. Isolate these devices from public networks if possible and apply any available patches or vendor mitigations. Audit logs for suspicious activity, particularly around RADIUS configuration endpoints.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2025-71284 | OS Command Injection | Synway SMG Gateway Management Software |
| CVE-2025-71284 | RCE | Vulnerable endpoint: /en/9-2radius.php |
| CVE-2025-71284 | OS Command Injection | Vulnerable parameters: radius_address, radius_address2, shared_secret2, source_ip, timeout, retry |
| CVE-2025-71284 | OS Command Injection | Attack vector: POST request to /en/9-2radius.php with save=1 and enable_radius=1 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 30, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.