CVE-2025-14708

A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.336425 Permissions Required VDB Entry
https://vuldb.com/?id.336425 Third Party Advisory VDB Entry
https://vuldb.com/?submit.706977 Third Party Advisory VDB Entry
https://www.notion.so/sgwbox-NAS-N3-Buffer-Overflow-2be6cf4e528a808b9f71fe434929c73b?source=copy_link Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sgwbox:n3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sgwbox:n3:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-15 07:15

Updated : 2026-01-09 02:27


NVD link : CVE-2025-14708

Mitre link : CVE-2025-14708

CVE.ORG link : CVE-2025-14708


JSON object : View

Products Affected

sgwbox

  • n3
  • n3_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')