Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14704: Path Traversal in Shiguangwu sgwbox N3

0
Medium
VulnerabilityCVE-2025-14704cvecve-2025-14704
Published: Mon Dec 15 2025 (12/15/2025, 04:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

CVE-2025-14704 is a path traversal vulnerability in the Shiguangwu sgwbox N3 version 2. 0. 25, specifically in an unknown function of the /eshell API component. This flaw allows remote attackers to manipulate file paths, potentially accessing unauthorized files on the device. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although the vendor has not responded and no official patch is available, public exploit code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the ability to read or possibly modify files. European organizations using this product, especially in critical infrastructure or industrial environments, could be at risk.

AI-Powered Analysis

AILast updated: 12/15/2025, 05:15:15 UTC

Technical Analysis

CVE-2025-14704 is a path traversal vulnerability identified in the Shiguangwu sgwbox N3 device, version 2.0.25. The vulnerability resides in an unspecified function within the /eshell API component, which improperly sanitizes user-supplied input used in file path operations. This flaw enables remote attackers to craft malicious requests that traverse directories outside the intended scope, potentially accessing sensitive files or directories on the device's filesystem. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The vulnerability has a CVSS 4.0 score of 6.9, reflecting medium severity, with the vector indicating low complexity and no privileges required. Although no official patch or vendor response has been issued, public exploit code is available, increasing the likelihood of exploitation in the wild. The impact includes unauthorized disclosure of sensitive information, potential modification of files, and disruption of device operations. The affected product, sgwbox N3, is typically used in industrial or specialized network environments, where device compromise could have operational consequences. The lack of vendor engagement and patch availability necessitates proactive defensive measures by users and administrators.

Potential Impact

For European organizations, the exploitation of CVE-2025-14704 could lead to unauthorized access to sensitive configuration files, credentials, or operational data stored on the sgwbox N3 device. This could compromise confidentiality and integrity, potentially allowing attackers to pivot within internal networks or disrupt industrial processes. The availability impact is limited but possible if critical files are modified or deleted. Organizations relying on Shiguangwu devices in sectors such as manufacturing, energy, or telecommunications may face operational disruptions or data breaches. Given the remote exploitability without authentication, attackers could target exposed devices directly over the internet or through compromised internal networks. The public availability of exploit code increases the risk of opportunistic attacks. The vendor's lack of response and absence of patches heighten the urgency for organizations to implement compensating controls to mitigate potential damage.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. These include restricting network access to the sgwbox N3 devices by placing them behind firewalls or VPNs, limiting exposure to untrusted networks. Employ strict access control lists (ACLs) to allow only trusted management hosts to communicate with the /eshell API endpoint. Monitor network traffic for unusual or suspicious requests targeting the /eshell path, using intrusion detection or prevention systems (IDS/IPS) with custom signatures for path traversal patterns. Regularly audit device configurations and filesystem integrity to detect unauthorized changes. If feasible, isolate affected devices from critical network segments to reduce lateral movement risk. Engage with Shiguangwu or third-party security vendors for potential unofficial patches or workarounds. Maintain up-to-date backups of device configurations and data to enable recovery in case of compromise. Finally, educate operational technology (OT) and IT teams about this vulnerability and the importance of layered defenses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:00:57.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693f95ffd9bcdf3f3db20cc4

Added to database: 12/15/2025, 5:00:47 AM

Last enriched: 12/15/2025, 5:15:15 AM

Last updated: 12/15/2025, 5:19:39 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats