[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2025-71284":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-01T12:24:33.086Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":55,"duplicate_of":9,"upstream":56,"downstream":57,"duplicates":58,"related":59,"reserved_at":9,"published_at":60,"modified_at":61,"state":62,"summary":63,"references_raw":69,"kevs":93,"epss":9,"epss_history":94,"metrics":95,"affected":107},"CVE-2025-71284","Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and interpolated directly into a sed command without sanitization. An unauthenticated remote attacker can inject arbitrary shell commands by submitting a POST request with crafted radius_address, radius_address2, shared_secret2, source_ip, timeout, or retry parameters along with save=1 and enable_radius=1 to achieve remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 (UTC).",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],[41,50],{"_key":42,"name":43,"source":44,"url":45,"maturity":46,"reliability_score":47,"verified":48,"type":9,"platforms":49,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_BDE419496101F514","Exploit Reference (mrxn.net)","reference","https://mrxn.net/jswz/synway-9-2radius-rce.html","unknown",0.2,false,[],{"_key":51,"name":52,"source":44,"url":53,"maturity":46,"reliability_score":47,"verified":48,"type":9,"platforms":54,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_CC22763A7DC0C535","Exploit Reference (mp.weixin.qq.com)","https://mp.weixin.qq.com/s/PyepoFSuQ63E3RnpQa9nsA",[],[],[],[],[],[],"2026-04-30T16:08:17.336Z","2026-04-30T18:06:54.755Z","Awaiting Analysis",{"cisa_kev":48,"cisa_ransomware":48,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":64,"severity_score":65,"severity_version":66,"severity_source":67,"severity_vector":68,"severity_status":62},"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[70,75,80,83,88],{"url":71,"sources":72,"tags":74},"https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/synway/synwaysmg-radius-rce.yaml",[67,73],"nvd",[],{"url":45,"sources":76,"tags":77},[67,73],[78,79],"Technical Description","Exploit",{"url":53,"sources":81,"tags":82},[67,73],[78,79],{"url":84,"sources":85,"tags":86},"https://www.synway.net/",[67,73],[87],"Product",{"url":89,"sources":90,"tags":91},"https://www.vulncheck.com/advisories/synway-smg-gateway-management-software-os-command-injection-via-radius-address",[67,73],[92],"Third Party Advisory",[],[],[96,103],{"source":67,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":97,"cvss_v4_0":100},{"baseScore":65,"baseSeverity":98,"vectorString":68,"impactScore":65,"exploitabilityScore":99},"CRITICAL",10,{"baseScore":101,"baseSeverity":98,"vectorString":102,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":73,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":104,"cvss_v4_0":105},{"baseScore":65,"baseSeverity":98,"vectorString":68,"impactScore":65,"exploitabilityScore":99},{"baseScore":101,"baseSeverity":98,"vectorString":106,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[108],{"ecosystem":9,"name":109,"vendor":110,"product":111,"cpe_part":112,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":113},"Synway SMG Gateway Management Software","synway information engineering co., ltd.","synway smg gateway management software","a",[114],{"version":115,"is_range":48,"range_type":67,"version_start":115,"version_start_type":116,"version_end":115,"version_end_type":116,"fixed_in":9},"0","including"]