CVE-2025-14706
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on Shiguangwu sgwbox N3 devices through command injection in the NETREBOOT Interface. Attackers can exploit this without authentication to gain full control of affected systems. All users running sgwbox N3 version 2.0.25 are affected.
💻 Affected Systems
- Shiguangwu sgwbox N3
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install malware, exfiltrate data, pivot to other systems, or render the device unusable.
Likely Case
Remote code execution leading to data theft, ransomware deployment, or unauthorized access to network resources.
If Mitigated
Limited impact if device is isolated from internet and internal networks with strict network segmentation.
🎯 Exploit Status
Public exploit details are available, making this easily weaponizable by attackers with minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available - vendor did not respond to disclosure
Restart Required: No
Instructions:
No official patch available. Consider workarounds or replacement of affected devices.
🔧 Temporary Workarounds
Network Isolation
linuxBlock access to the NETREBOOT Interface from untrusted networks
iptables -A INPUT -p tcp --dport [NETREBOOT_PORT] -j DROP
ufw deny [NETREBOOT_PORT]
Service Disablement
linuxDisable the vulnerable http_eshell_server service
systemctl stop http_eshell_server
systemctl disable http_eshell_server
chmod -x /usr/sbin/http_eshell_server
🧯 If You Can't Patch
- Immediately isolate affected devices from internet and critical internal networks
- Implement strict network segmentation and monitor for suspicious outbound connections
🔍 How to Verify
Check if Vulnerable:
Check if /usr/sbin/http_eshell_server exists and device version is 2.0.25
Check Version:
cat /etc/version | grep sgwbox
Verify Fix Applied:
Verify http_eshell_server service is stopped and inaccessible on network
📡 Detection & Monitoring
Log Indicators:
- Unusual commands in system logs
- Suspicious processes spawned from http_eshell_server
- Failed authentication attempts to NETREBOOT Interface
Network Indicators:
- Unexpected outbound connections from sgwbox device
- Traffic to/from NETREBOOT port with command-like patterns
SIEM Query:
source="sgwbox" AND (process="http_eshell_server" OR port="[NETREBOOT_PORT]") AND command="*;*" OR command="*|*" OR command="*`*"