Synway SMG Gateway Management Software Unauthenticated OS Command Injection
Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.
Synway SMG Gateway Management Software is susceptible to an OS command injection vulnerability (CVE-2025-71284) within the RADIUS configuration endpoint. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted POST request to /en/9-2radius.php. The vulnerability lies in the improper sanitization of the radius_address POST parameter, which is directly incorporated into a sed command. The Shadowserver Foundation observed the first exploitation evidence on 2025-07-11 (UTC). Successful exploitation allows the attacker to execute arbitrary shell commands on the affected system, potentially compromising the entire gateway. This vulnerability poses a significant risk to organizations using the Synway SMG Gateway, as it enables unauthenticated remote code execution.
Attack Chain
- An unauthenticated attacker identifies a Synway SMG Gateway Management Software instance exposed to the network.
- The attacker crafts a malicious POST request targeting the
/en/9-2radius.phpendpoint. - The POST request includes parameters such as
radius_address,radius_address2,shared_secret2,source_ip,timeout, orretryalong withsave=1andenable_radius=1. - The
radius_addressparameter contains an OS command injection payload. - The application improperly sanitizes the
radius_addressparameter and incorporates it into asedcommand. - The injected command is executed by the operating system, granting the attacker arbitrary code execution privileges.
- The attacker establishes a reverse shell to maintain persistence and expand their foothold.
- The attacker pivots within the network, gaining access to sensitive data or systems, and potentially establishing a long-term presence.
Impact
Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the Synway SMG Gateway. This could lead to complete system compromise, data theft, disruption of services, and further propagation of attacks within the network. Given the high CVSS score (9.8), this vulnerability represents a critical threat. The number of affected systems and organizations is currently unknown.
Recommendation
- Deploy the Sigma rule “Synway SMG Gateway Radius Command Injection Attempt” to your SIEM to detect exploitation attempts based on suspicious POST requests to the vulnerable endpoint.
- Apply input validation and sanitization to the
radius_address,radius_address2,shared_secret2,source_ip,timeout, andretryparameters in the RADIUS configuration endpoint. - Monitor web server logs for POST requests to
/en/9-2radius.phpcontaining suspicious characters or command sequences indicative of command injection attacks to activate the “Synway SMG Gateway Radius Command Injection Attempt” rule.
Detection coverage 2
Synway SMG Gateway Radius Command Injection Attempt
criticalDetects potential OS command injection attempts via POST requests to the Synway SMG Gateway RADIUS configuration endpoint.
Synway SMG Gateway Radius Command Injection UserAgent Curl
highDetects potential OS command injection attempts via POST requests to the Synway SMG Gateway RADIUS configuration endpoint with UserAgent as Curl
Detection queries are kept inside the platform. Get full rules →