Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14708: Buffer Overflow in Shiguangwu sgwbox N3

0
Critical
VulnerabilityCVE-2025-14708cvecve-2025-14708
Published: Mon Dec 15 2025 (12/15/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Shiguangwu
Product: sgwbox N3

Description

A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/15/2025, 07:00:25 UTC

Technical Analysis

CVE-2025-14708 is a critical security vulnerability identified in the Shiguangwu sgwbox N3 device, version 2.0.25. The vulnerability resides in an unspecified functionality of the /usr/sbin/http_eshell_server binary, specifically within the WIREDCFGGET interface. By manipulating the 'params' argument passed to this interface, an attacker can trigger a buffer overflow condition. Buffer overflows occur when input data exceeds the allocated buffer size, potentially overwriting adjacent memory and enabling arbitrary code execution or system crashes. This vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 9.3 reflects the ease of exploitation (network vector, low complexity), lack of required privileges or user interaction, and the high impact on confidentiality, integrity, and availability. The vendor Shiguangwu was contacted but has not responded or released a patch, and a public exploit has been made available, increasing the likelihood of exploitation in the wild. The affected product, sgwbox N3, is a network device likely used in enterprise or industrial environments. Exploitation could allow attackers to execute arbitrary code remotely, leading to full system compromise, data theft, or denial of service. The lack of vendor response and patch availability necessitates immediate defensive measures by users of this product.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying Shiguangwu sgwbox N3 devices in critical network segments. Successful exploitation could lead to remote code execution, allowing attackers to gain unauthorized control over affected devices. This could result in data breaches, disruption of services, or pivoting deeper into organizational networks. Given the device's likely role in network management or industrial control, the impact could extend to operational technology environments, potentially affecting availability of critical infrastructure. The public availability of an exploit increases the risk of opportunistic attacks and targeted campaigns. Organizations in sectors such as telecommunications, manufacturing, energy, and government are particularly vulnerable. The absence of vendor patches means that affected entities must rely on compensating controls, increasing operational complexity and risk. Failure to mitigate could lead to severe confidentiality, integrity, and availability losses, regulatory penalties under GDPR, and reputational damage.

Mitigation Recommendations

1. Immediately identify and inventory all Shiguangwu sgwbox N3 devices running version 2.0.25 within the network. 2. If feasible, isolate these devices from untrusted networks by implementing strict network segmentation and firewall rules to restrict access to the vulnerable service (/usr/sbin/http_eshell_server). 3. Disable or restrict access to the WIREDCFGGET interface or the http_eshell_server service if operationally possible. 4. Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 5. Monitor logs and network traffic for anomalous activity related to the vulnerable interface or exploit indicators. 6. Engage with Shiguangwu or authorized resellers to seek firmware updates or patches, and apply them promptly once available. 7. Consider deploying endpoint detection and response (EDR) solutions on network segments hosting these devices to detect post-exploitation activity. 8. Develop and test incident response plans specific to exploitation of this vulnerability. 9. Educate network and security teams about the vulnerability and exploit characteristics to enhance detection and response capabilities. 10. For long-term risk reduction, evaluate alternative products or vendors with better security support and patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T19:01:09.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693fae77d9bcdf3f3dbb3e95

Added to database: 12/15/2025, 6:45:11 AM

Last enriched: 12/15/2025, 7:00:25 AM

Last updated: 12/15/2025, 5:14:05 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats