Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14706: Command Injection in Shiguangwu sgwbox N3

0
Critical
VulnerabilityCVE-2025-14706cvecve-2025-14706
Published: Mon Dec 15 2025 (12/15/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

A vulnerability was identified in Shiguangwu sgwbox N3 2.0.25. This impacts an unknown function of the file /usr/sbin/http_eshell_server of the component NETREBOOT Interface. Such manipulation leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/22/2025, 06:07:47 UTC

Technical Analysis

CVE-2025-14706 is a critical remote command injection vulnerability affecting Shiguangwu sgwbox N3 version 2.0.25. The vulnerability resides in an unspecified function within the /usr/sbin/http_eshell_server binary, part of the NETREBOOT Interface. This interface appears to provide remote management or reboot capabilities. Due to improper input validation or sanitization, an attacker can inject arbitrary shell commands remotely without authentication or user interaction. The vulnerability is exploitable over the network with low complexity and no privileges required, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects that exploitation leads to full compromise of confidentiality, integrity, and availability of the affected device. The vendor was contacted early but did not respond or provide a patch, and no official remediation is currently available. A public exploit is known, increasing the likelihood of exploitation attempts. The affected product is likely used in network environments for device management or reboot functions, making this vulnerability a significant threat to operational continuity and security. Attackers exploiting this flaw could execute arbitrary commands, potentially gaining full control over the device, disrupting network operations, or using the device as a pivot point for further attacks.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. Shiguangwu sgwbox N3 devices, if deployed in network management, telecommunications, or critical infrastructure environments, could be fully compromised, leading to unauthorized access, data breaches, or denial of service. The ability to execute arbitrary commands remotely without authentication means attackers can disrupt services, manipulate configurations, or install persistent malware. This could affect availability of critical network services and compromise sensitive data. The lack of vendor response and patches increases the risk exposure. Organizations relying on these devices may face operational disruptions, financial losses, and reputational damage. Additionally, attackers could leverage compromised devices to launch lateral attacks within internal networks, escalating the overall security risk.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement immediate compensating controls. These include isolating affected devices within segmented network zones with strict firewall rules to restrict access to the NETREBOOT Interface. Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious command injection attempts targeting /usr/sbin/http_eshell_server. Disable or restrict remote management interfaces if not essential. Conduct thorough asset inventories to identify all sgwbox N3 devices and assess exposure. Apply strict access control lists (ACLs) limiting management access to trusted IP addresses only. Regularly monitor device logs for anomalous activity indicative of exploitation attempts. Consider deploying virtual patching via web application firewalls (WAFs) or network proxies to filter malicious payloads. Finally, maintain heightened vigilance for any updates from the vendor or third-party security advisories and prepare for prompt patch application once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:01:03.154Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693fa079d9bcdf3f3db5fb2c

Added to database: 12/15/2025, 5:45:29 AM

Last enriched: 12/22/2025, 6:07:47 AM

Last updated: 2/5/2026, 1:18:33 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats