Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14708: Buffer Overflow in Shiguangwu sgwbox N3

0
Critical
VulnerabilityCVE-2025-14708cvecve-2025-14708
Published: Mon Dec 15 2025 (12/15/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/22/2025, 07:22:13 UTC

Technical Analysis

CVE-2025-14708 identifies a critical buffer overflow vulnerability in the Shiguangwu sgwbox N3 device, version 2.0.25. The flaw exists in an unspecified functionality within the /usr/sbin/http_eshell_server binary, specifically in the WIREDCFGGET Interface component. Attackers can remotely exploit this vulnerability by manipulating the 'params' argument, causing a buffer overflow condition. This overflow can lead to arbitrary code execution or system crashes, potentially allowing attackers to gain full control over the affected device. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The vendor was notified early but has not issued any response or patch, and the exploit code has been publicly released, increasing the likelihood of active exploitation. The CVSS v4.0 score of 9.3 reflects the vulnerability's critical nature, with high impact on confidentiality, integrity, and availability, and an attack vector that is network-based with low complexity. The affected product, sgwbox N3, is a network device likely used in specialized environments, and the lack of vendor support complicates remediation efforts. Organizations must assume that exploitation can lead to complete device compromise, potentially serving as a foothold for broader network attacks.

Potential Impact

For European organizations, the impact of CVE-2025-14708 is severe. The affected Shiguangwu sgwbox N3 devices, if deployed within critical infrastructure, telecommunications, or enterprise networks, could be compromised remotely without any authentication, leading to unauthorized access, data leakage, or disruption of services. The buffer overflow could allow attackers to execute arbitrary code, potentially installing persistent malware or using the device as a pivot point for lateral movement within networks. This could result in significant confidentiality breaches, integrity violations through unauthorized configuration changes, and availability issues due to device crashes or denial of service. The public availability of the exploit increases the risk of widespread attacks, including automated scanning and exploitation campaigns targeting vulnerable devices in Europe. The lack of vendor response and patches means organizations must rely on alternative mitigation strategies, increasing operational risk. The threat is particularly acute for sectors with high reliance on network devices from Shiguangwu, including telecom providers and industrial control systems, where device compromise could have cascading effects on service continuity and data protection obligations under GDPR.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement the following specific mitigations: 1) Immediately identify and inventory all Shiguangwu sgwbox N3 devices running version 2.0.25 within the network. 2) Isolate affected devices from untrusted networks, especially the internet, by implementing strict network segmentation and access controls limiting communication to trusted management hosts only. 3) Employ network-based intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics designed to detect exploitation attempts targeting the /usr/sbin/http_eshell_server component or anomalous WIREDCFGGET Interface traffic. 4) Disable or restrict access to the vulnerable service if possible, or apply firewall rules to block incoming traffic to the affected interface. 5) Monitor device logs and network traffic for signs of exploitation or unusual behavior indicative of compromise. 6) Develop an incident response plan specific to this vulnerability, including rapid containment and forensic analysis capabilities. 7) Engage with Shiguangwu or third-party security vendors for potential unofficial patches or workarounds. 8) Plan for device replacement or upgrade to a secure version once available. 9) Educate network administrators about the vulnerability and exploitation indicators to improve detection and response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:01:09.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693fae77d9bcdf3f3dbb3e95

Added to database: 12/15/2025, 6:45:11 AM

Last enriched: 12/22/2025, 7:22:13 AM

Last updated: 2/3/2026, 10:02:11 PM

Views: 159

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats