Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14704: Path Traversal in Shiguangwu sgwbox N3

0
Medium
VulnerabilityCVE-2025-14704cvecve-2025-14704
Published: Mon Dec 15 2025 (12/15/2025, 04:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. The impacted element is an unknown function of the file /eshell of the component API. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/22/2025, 06:07:21 UTC

Technical Analysis

CVE-2025-14704 identifies a path traversal vulnerability in the Shiguangwu sgwbox N3 device, specifically version 2.0.25. The vulnerability resides in an unspecified function of the /eshell API component, which improperly validates or sanitizes user input, allowing an attacker to manipulate file paths. This manipulation enables traversal outside the intended directory boundaries, potentially exposing sensitive files or system resources. The vulnerability can be exploited remotely without requiring authentication or user interaction, increasing the attack surface significantly. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low attack complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Despite the vendor being notified early, no patch or official response has been issued, and exploit code has been publicly disclosed, raising the risk of exploitation. The lack of known active exploits in the wild currently limits immediate widespread impact but does not preclude targeted attacks. The vulnerability could be leveraged to read sensitive configuration files, credentials, or system binaries, potentially leading to further compromise or lateral movement within affected networks.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data disclosure and potential system compromise, especially in environments where Shiguangwu sgwbox N3 devices are deployed in critical network segments. Confidentiality could be compromised by attackers accessing sensitive files, including credentials or configuration data. Integrity and availability impacts are limited but possible if attackers modify or delete critical files after gaining access. The remote, unauthenticated nature of the exploit increases the likelihood of exploitation, particularly in poorly segmented or exposed networks. Organizations in sectors such as telecommunications, industrial control, or enterprise networking that utilize this product could face operational disruptions or data breaches. The absence of vendor patches necessitates reliance on compensating controls, increasing operational overhead. Additionally, the public availability of exploit code lowers the barrier for attackers, including opportunistic threat actors and cybercriminals targeting European infrastructure.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement specific mitigations: 1) Restrict network access to the /eshell API endpoint by applying firewall rules or network segmentation to limit exposure only to trusted management networks. 2) Deploy intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics to detect path traversal attempts targeting /eshell. 3) Monitor logs and network traffic for unusual access patterns or attempts to access unauthorized file paths. 4) If possible, disable or restrict the /eshell API functionality until a vendor patch is available. 5) Conduct thorough asset inventories to identify all devices running sgwbox N3 2.0.25 and prioritize their isolation or enhanced monitoring. 6) Engage with the vendor or community to track any forthcoming patches or workarounds. 7) Consider deploying application-layer gateways or reverse proxies that can sanitize or block malicious requests targeting the vulnerable API. 8) Educate security teams about the vulnerability and ensure incident response plans include scenarios involving path traversal exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:00:57.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693f95ffd9bcdf3f3db20cc4

Added to database: 12/15/2025, 5:00:47 AM

Last enriched: 12/22/2025, 6:07:21 AM

Last updated: 2/5/2026, 6:30:44 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats