Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14705: Command Injection in Shiguangwu sgwbox N3

0
Critical
VulnerabilityCVE-2025-14705cvecve-2025-14705
Published: Mon Dec 15 2025 (12/15/2025, 05:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

A vulnerability was determined in Shiguangwu sgwbox N3 2.0.25. This affects an unknown function of the component SHARESERVER Feature. This manipulation of the argument params causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/15/2025, 05:30:13 UTC

Technical Analysis

CVE-2025-14705 is a critical remote command injection vulnerability identified in the Shiguangwu sgwbox N3 device, version 2.0.25. The vulnerability resides in an unspecified function within the SHARESERVER feature, which processes input parameters insecurely, allowing attackers to inject and execute arbitrary system commands remotely. This flaw requires no authentication or user interaction, making it trivially exploitable over the network. The vulnerability impacts confidentiality, integrity, and availability by enabling full system compromise, potentially allowing attackers to steal data, disrupt services, or pivot within networks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) indicates network attack vector, low complexity, no privileges or user interaction needed, and high impact on all security objectives. Despite early vendor notification, no patch or mitigation guidance has been released, and public exploit information is available, increasing the urgency for defensive measures. The affected product, sgwbox N3, is used in networked environments for file sharing or related services, making it a high-value target for attackers seeking persistent access or data exfiltration. The lack of vendor response and patch availability elevates the threat level and necessitates immediate risk management by users.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the potential for complete system takeover without authentication. Attackers can execute arbitrary commands, leading to data theft, service disruption, or establishing persistent footholds within corporate networks. Organizations relying on the sgwbox N3 for file sharing or network services may experience operational outages and compromise of sensitive information. The absence of a vendor patch increases exposure time, raising the likelihood of exploitation especially in sectors with critical infrastructure or sensitive data such as finance, healthcare, and government. Additionally, the public disclosure of exploit details facilitates rapid weaponization by threat actors. The impact extends beyond individual devices to potentially compromise connected systems and networks, amplifying the threat to European enterprises and public sector entities.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement immediate compensating controls: 1) Isolate the sgwbox N3 devices from untrusted networks, restricting access to trusted management networks only. 2) Disable the SHARESERVER feature if feasible, or restrict its usage to essential users with strict access controls. 3) Employ network-level filtering (firewalls, IDS/IPS) to detect and block suspicious command injection attempts targeting the vulnerable component. 4) Monitor device logs and network traffic for anomalous commands or connections indicative of exploitation attempts. 5) Conduct thorough asset inventories to identify all affected devices and prioritize their remediation or replacement. 6) Engage with vendors or third-party security providers for potential unofficial patches or workarounds. 7) Prepare incident response plans specific to this vulnerability to rapidly contain any detected compromise. These steps go beyond generic advice by focusing on network segmentation, feature disablement, and active monitoring tailored to the vulnerability’s characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:00:59.968Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693f9960d9bcdf3f3db32099

Added to database: 12/15/2025, 5:15:12 AM

Last enriched: 12/15/2025, 5:30:13 AM

Last updated: 12/15/2025, 9:38:56 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats