Cyber Posture

CVE-2025-14707

CriticalPublic PoC

Published: 15 December 2025

Published
15 December 2025
Modified
09 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0147 81.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A security flaw has been discovered in Shiguangwu sgwbox N3 2.0.25. Affected is an unknown function of the file /usr/sbin/http_eshell_server of the component DOCKER Feature. Performing manipulation of the argument params results in command injection. The attack may be initiated…

more

remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validating and sanitizing inputs such as the 'params' argument to directly prevent command injection in /usr/sbin/http_eshell_server.

prevent

SI-2 mandates timely flaw remediation for vulnerabilities like CVE-2025-14707, eliminating the command injection risk through patching or equivalent measures.

prevent

AC-6 enforces least privilege on the affected Docker feature process, limiting the scope and impact of arbitrary command execution even if injection succeeds.

Security SummaryAI

CVE-2025-14707 is a command injection vulnerability affecting Shiguangwu sgwbox N3 version 2.0.25. The flaw resides in an unknown function within the file /usr/sbin/http_eshell_server of the DOCKER Feature component, where manipulation of the "params" argument enables arbitrary command execution. It is associated with CWEs-74 and CWE-77 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

The vulnerability is exploitable remotely by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to inject and execute arbitrary commands on the affected system, potentially leading to full compromise with high impacts on confidentiality, integrity, and availability.

Advisories from VulDB detail the issue and note that the vendor was contacted early for disclosure but provided no response. No patches or specific mitigations are referenced in the available information.

An exploit for this vulnerability has been publicly released, heightening the potential for real-world attacks.

Details

CWE(s)

Affected Products

sgwbox
n3 firmware
≤ 2.0.25

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
Why these techniques?

Remote unauthenticated command injection (CWE-77) in public-facing http_eshell_server enables exploitation of public-facing applications (T1190), indirect command execution (T1202), and adversary execution via Unix Shell (T1059.004).

References