Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14706: Command Injection in Shiguangwu sgwbox N3

0
Critical
VulnerabilityCVE-2025-14706cvecve-2025-14706
Published: Mon Dec 15 2025 (12/15/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

A vulnerability was identified in Shiguangwu sgwbox N3 2.0.25. This impacts an unknown function of the file /usr/sbin/http_eshell_server of the component NETREBOOT Interface. Such manipulation leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/15/2025, 06:00:39 UTC

Technical Analysis

CVE-2025-14706 is a critical remote command injection vulnerability found in Shiguangwu sgwbox N3 version 2.0.25. The vulnerability resides in an unspecified function within the /usr/sbin/http_eshell_server binary, which is part of the NETREBOOT Interface component. This interface appears to provide remote management or reboot capabilities for the device. Due to insufficient input validation or sanitization, an attacker can inject arbitrary OS commands remotely without requiring authentication or user interaction. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as arbitrary commands can lead to full system compromise, data exfiltration, or denial of service. The CVSS 4.0 vector reflects these factors with a score of 9.3, categorizing it as critical. Although no active exploitation in the wild has been reported, a public exploit exists, increasing the risk of imminent attacks. The vendor was notified early but has not responded or provided patches, leaving affected users exposed. The lack of patches and vendor engagement heightens the urgency for organizations to implement compensating controls. The vulnerability affects only version 2.0.25 of the sgwbox N3 product, which is a network device likely used in infrastructure or enterprise environments. Given the critical nature and remote exploitability, this vulnerability represents a severe threat to affected deployments.

Potential Impact

For European organizations, the impact of CVE-2025-14706 can be severe. The ability for unauthenticated remote attackers to execute arbitrary commands on network devices can lead to full device takeover, allowing attackers to manipulate network traffic, exfiltrate sensitive data, disrupt services, or use compromised devices as footholds for lateral movement within networks. Organizations relying on Shiguangwu sgwbox N3 for network management or infrastructure control may experience outages or data breaches, impacting business continuity and regulatory compliance, especially under GDPR. Critical sectors such as telecommunications, energy, and government agencies are particularly vulnerable due to their reliance on robust network infrastructure. The absence of vendor patches and public exploit availability increases the likelihood of exploitation attempts targeting European entities. Additionally, compromised devices could be leveraged in broader cyberattacks, including ransomware or espionage campaigns, amplifying the threat landscape. The reputational damage and financial costs associated with such incidents could be substantial.

Mitigation Recommendations

Given the lack of official patches, European organizations should immediately implement the following mitigations: 1) Isolate the sgwbox N3 devices from untrusted networks by placing them behind firewalls or within segmented VLANs to restrict access to the NETREBOOT Interface. 2) Disable or restrict remote access to the /usr/sbin/http_eshell_server service if possible, or limit access to trusted IP addresses only. 3) Monitor network traffic and device logs for unusual commands or connections indicative of exploitation attempts. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting known exploit patterns for this vulnerability. 5) Consider deploying virtual patching or application-layer firewalls to block malicious payloads targeting the command injection vector. 6) Plan for device replacement or firmware upgrade once vendor patches become available, or evaluate alternative products with better security support. 7) Conduct regular security assessments and penetration tests focusing on network device exposures. 8) Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving network device compromise. These targeted actions go beyond generic advice by focusing on network segmentation, access control, and active monitoring specific to the vulnerable component and its exploitation method.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:01:03.154Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693fa079d9bcdf3f3db5fb2c

Added to database: 12/15/2025, 5:45:29 AM

Last enriched: 12/15/2025, 6:00:39 AM

Last updated: 12/15/2025, 9:26:17 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats