A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. The impacted element is an unknown function of the file /eshell of the component API. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://vuldb.com/?ctiid.336421 | Permissions Required VDB Entry |
| https://vuldb.com/?id.336421 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.706915 | Third Party Advisory VDB Entry |
| https://www.notion.so/sgwbox-NAS-N3-Directory-Traversal-2be6cf4e528a802a9c0ad6f01b75694e?source=copy_link | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-15 05:15
Updated : 2026-01-09 02:28
NVD link : CVE-2025-14704
Mitre link : CVE-2025-14704
CVE.ORG link : CVE-2025-14704
JSON object : View
Products Affected
sgwbox
- n3
- n3_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
