Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Synway SMG Gateway Management Software OS Command Injection via radius_address
Vulnerability Description
Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and interpolated directly into a sed command without sanitization. An unauthenticated remote attacker can inject arbitrary shell commands by submitting a POST request with crafted radius_address, radius_address2, shared_secret2, source_ip, timeout, or retry parameters along with save=1 and enable_radius=1 to achieve remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-11 (UTC).
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Synway SMG Gateway Management Software 操作系统命令注入漏洞
Vulnerability Description
Synway SMG Gateway Management Software是Synway公司的一款网关管理软件。 Synway SMG Gateway Management Software存在操作系统命令注入漏洞,该漏洞源于RADIUS配置端点/en/9-2radius.php中radius_address POST参数未经清理直接插入sed命令,可能导致未经身份验证的远程攻击者通过提交特制POST请求注入任意shell命令,实现远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A