<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SMG Gateway Management Software — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/smg-gateway-management-software/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 17:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/smg-gateway-management-software/feed.xml" rel="self" type="application/rss+xml"/><item><title>Synway SMG Gateway Management Software Unauthenticated OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</link><pubDate>Thu, 30 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</guid><description>Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.</description><content:encoded><![CDATA[<p>Synway SMG Gateway Management Software is susceptible to an OS command injection vulnerability (CVE-2025-71284) within the RADIUS configuration endpoint. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted POST request to <code>/en/9-2radius.php</code>. The vulnerability lies in the improper sanitization of the <code>radius_address</code> POST parameter, which is directly incorporated into a <code>sed</code> command. The Shadowserver Foundation observed the first exploitation evidence on 2025-07-11 (UTC). Successful exploitation allows the attacker to execute arbitrary shell commands on the affected system, potentially compromising the entire gateway. This vulnerability poses a significant risk to organizations using the Synway SMG Gateway, as it enables unauthenticated remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Synway SMG Gateway Management Software instance exposed to the network.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/en/9-2radius.php</code> endpoint.</li>
<li>The POST request includes parameters such as <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, or <code>retry</code> along with <code>save=1</code> and <code>enable_radius=1</code>.</li>
<li>The <code>radius_address</code> parameter contains an OS command injection payload.</li>
<li>The application improperly sanitizes the <code>radius_address</code> parameter and incorporates it into a <code>sed</code> command.</li>
<li>The injected command is executed by the operating system, granting the attacker arbitrary code execution privileges.</li>
<li>The attacker establishes a reverse shell to maintain persistence and expand their foothold.</li>
<li>The attacker pivots within the network, gaining access to sensitive data or systems, and potentially establishing a long-term presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the Synway SMG Gateway. This could lead to complete system compromise, data theft, disruption of services, and further propagation of attacks within the network. Given the high CVSS score (9.8), this vulnerability represents a critical threat. The number of affected systems and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; to your SIEM to detect exploitation attempts based on suspicious POST requests to the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, and <code>retry</code> parameters in the RADIUS configuration endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/en/9-2radius.php</code> containing suspicious characters or command sequences indicative of command injection attacks to activate the &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>network</category></item></channel></rss>