CVE-2025-14704: Path Traversal in Shiguangwu sgwbox N3
CVE-2025-14704 is a path traversal vulnerability in the Shiguangwu sgwbox N3 version 2. 0. 25, specifically in an unknown function of the /eshell API component. This flaw allows remote attackers to manipulate file paths, potentially accessing unauthorized files on the device. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although the vendor has not responded and no official patch is available, public exploit code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the ability to read or possibly modify files. European organizations using this product, especially in critical infrastructure or industrial environments, could be at risk.
AI Analysis
Technical Summary
CVE-2025-14704 is a path traversal vulnerability identified in the Shiguangwu sgwbox N3 device, version 2.0.25. The vulnerability resides in an unspecified function within the /eshell API component, which improperly sanitizes user-supplied input used in file path operations. This flaw enables remote attackers to craft malicious requests that traverse directories outside the intended scope, potentially accessing sensitive files or directories on the device's filesystem. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The vulnerability has a CVSS 4.0 score of 6.9, reflecting medium severity, with the vector indicating low complexity and no privileges required. Although no official patch or vendor response has been issued, public exploit code is available, increasing the likelihood of exploitation in the wild. The impact includes unauthorized disclosure of sensitive information, potential modification of files, and disruption of device operations. The affected product, sgwbox N3, is typically used in industrial or specialized network environments, where device compromise could have operational consequences. The lack of vendor engagement and patch availability necessitates proactive defensive measures by users and administrators.
Potential Impact
For European organizations, the exploitation of CVE-2025-14704 could lead to unauthorized access to sensitive configuration files, credentials, or operational data stored on the sgwbox N3 device. This could compromise confidentiality and integrity, potentially allowing attackers to pivot within internal networks or disrupt industrial processes. The availability impact is limited but possible if critical files are modified or deleted. Organizations relying on Shiguangwu devices in sectors such as manufacturing, energy, or telecommunications may face operational disruptions or data breaches. Given the remote exploitability without authentication, attackers could target exposed devices directly over the internet or through compromised internal networks. The public availability of exploit code increases the risk of opportunistic attacks. The vendor's lack of response and absence of patches heighten the urgency for organizations to implement compensating controls to mitigate potential damage.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. These include restricting network access to the sgwbox N3 devices by placing them behind firewalls or VPNs, limiting exposure to untrusted networks. Employ strict access control lists (ACLs) to allow only trusted management hosts to communicate with the /eshell API endpoint. Monitor network traffic for unusual or suspicious requests targeting the /eshell path, using intrusion detection or prevention systems (IDS/IPS) with custom signatures for path traversal patterns. Regularly audit device configurations and filesystem integrity to detect unauthorized changes. If feasible, isolate affected devices from critical network segments to reduce lateral movement risk. Engage with Shiguangwu or third-party security vendors for potential unofficial patches or workarounds. Maintain up-to-date backups of device configurations and data to enable recovery in case of compromise. Finally, educate operational technology (OT) and IT teams about this vulnerability and the importance of layered defenses.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Poland, Spain
CVE-2025-14704: Path Traversal in Shiguangwu sgwbox N3
Description
CVE-2025-14704 is a path traversal vulnerability in the Shiguangwu sgwbox N3 version 2. 0. 25, specifically in an unknown function of the /eshell API component. This flaw allows remote attackers to manipulate file paths, potentially accessing unauthorized files on the device. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although the vendor has not responded and no official patch is available, public exploit code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the ability to read or possibly modify files. European organizations using this product, especially in critical infrastructure or industrial environments, could be at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-14704 is a path traversal vulnerability identified in the Shiguangwu sgwbox N3 device, version 2.0.25. The vulnerability resides in an unspecified function within the /eshell API component, which improperly sanitizes user-supplied input used in file path operations. This flaw enables remote attackers to craft malicious requests that traverse directories outside the intended scope, potentially accessing sensitive files or directories on the device's filesystem. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The vulnerability has a CVSS 4.0 score of 6.9, reflecting medium severity, with the vector indicating low complexity and no privileges required. Although no official patch or vendor response has been issued, public exploit code is available, increasing the likelihood of exploitation in the wild. The impact includes unauthorized disclosure of sensitive information, potential modification of files, and disruption of device operations. The affected product, sgwbox N3, is typically used in industrial or specialized network environments, where device compromise could have operational consequences. The lack of vendor engagement and patch availability necessitates proactive defensive measures by users and administrators.
Potential Impact
For European organizations, the exploitation of CVE-2025-14704 could lead to unauthorized access to sensitive configuration files, credentials, or operational data stored on the sgwbox N3 device. This could compromise confidentiality and integrity, potentially allowing attackers to pivot within internal networks or disrupt industrial processes. The availability impact is limited but possible if critical files are modified or deleted. Organizations relying on Shiguangwu devices in sectors such as manufacturing, energy, or telecommunications may face operational disruptions or data breaches. Given the remote exploitability without authentication, attackers could target exposed devices directly over the internet or through compromised internal networks. The public availability of exploit code increases the risk of opportunistic attacks. The vendor's lack of response and absence of patches heighten the urgency for organizations to implement compensating controls to mitigate potential damage.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. These include restricting network access to the sgwbox N3 devices by placing them behind firewalls or VPNs, limiting exposure to untrusted networks. Employ strict access control lists (ACLs) to allow only trusted management hosts to communicate with the /eshell API endpoint. Monitor network traffic for unusual or suspicious requests targeting the /eshell path, using intrusion detection or prevention systems (IDS/IPS) with custom signatures for path traversal patterns. Regularly audit device configurations and filesystem integrity to detect unauthorized changes. If feasible, isolate affected devices from critical network segments to reduce lateral movement risk. Engage with Shiguangwu or third-party security vendors for potential unofficial patches or workarounds. Maintain up-to-date backups of device configurations and data to enable recovery in case of compromise. Finally, educate operational technology (OT) and IT teams about this vulnerability and the importance of layered defenses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-14T19:00:57.020Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693f95ffd9bcdf3f3db20cc4
Added to database: 12/15/2025, 5:00:47 AM
Last enriched: 12/15/2025, 5:15:15 AM
Last updated: 12/15/2025, 5:19:39 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55901: n/a
UnknownCVE-2025-55893: n/a
UnknownCVE-2025-11393: Unintended Proxy or Intermediary ('Confused Deputy') in Red Hat Red Hat Runtimes Inventory Operator
HighCVE-2025-66435: n/a
HighCVE-2025-66434: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.