CVE-2025-14708

9.8 CRITICAL

📋 TL;DR

A remote buffer overflow vulnerability exists in Shiguangwu sgwbox N3 devices version 2.0.25 through the WIREDCFGGET interface. Attackers can exploit this to execute arbitrary code or crash the system by sending specially crafted requests to the http_eshell_server component. This affects all users running the vulnerable version of sgwbox N3 NAS devices.

💻 Affected Systems

Products:
  • Shiguangwu sgwbox N3
Versions: 2.0.25
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the http_eshell_server component which appears to be enabled by default. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to install malware, steal data, or use the device as part of a botnet.

🟠

Likely Case

Remote code execution leading to device takeover, data theft, or denial of service through system crashes.

🟢

If Mitigated

Denial of service through system crashes if exploit attempts are blocked but still trigger the vulnerability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and the vulnerability requires no authentication, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch is available. The vendor has not responded to disclosure attempts. Consider workarounds or replacement.

🔧 Temporary Workarounds

Block WIREDCFGGET Interface Access

linux

Use firewall rules to block access to the vulnerable interface on port 80/443

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable http_eshell_server Service

linux

Stop and disable the vulnerable service if not required

systemctl stop http_eshell_server
systemctl disable http_eshell_server

🧯 If You Can't Patch

  • Isolate the device on a separate network segment with strict firewall rules
  • Implement network-based intrusion detection to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or SSH: cat /etc/version or check web admin panel

Check Version:

cat /etc/version || grep -i version /etc/*release

Verify Fix Applied:

Verify service is stopped: systemctl status http_eshell_server should show inactive

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /usr/sbin/http_eshell_server
  • Segmentation fault or crash logs from http_eshell_server

Network Indicators:

  • Unusual traffic patterns to device port 80/443 with buffer overflow patterns

SIEM Query:

source="sgwbox" AND (event="segmentation fault" OR event="buffer overflow")

🔗 References

📤 Share & Export