Cyber Posture

CVE-2025-14707

CriticalPublic PoCRCE

Published: 15 December 2025

Published
15 December 2025
Modified
09 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0268 86.0th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14707 is a critical-severity Injection (CWE-74) vulnerability in Sgwbox N3 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked in the top 14.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validating and sanitizing inputs such as the 'params' argument to directly prevent command injection in /usr/sbin/http_eshell_server.

prevent

SI-2 mandates timely flaw remediation for vulnerabilities like CVE-2025-14707, eliminating the command injection risk through patching or equivalent measures.

prevent

AC-6 enforces least privilege on the affected Docker feature process, limiting the scope and impact of arbitrary command execution even if injection succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
Why these techniques?

Remote unauthenticated command injection (CWE-77) in public-facing http_eshell_server enables exploitation of public-facing applications (T1190), indirect command execution (T1202), and adversary execution via Unix Shell (T1059.004).

NVD Description

A security flaw has been discovered in Shiguangwu sgwbox N3 2.0.25. Affected is an unknown function of the file /usr/sbin/http_eshell_server of the component DOCKER Feature. Performing manipulation of the argument params results in command injection. The attack may be initiated…

more

remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-14707 is a command injection vulnerability affecting Shiguangwu sgwbox N3 version 2.0.25. The flaw resides in an unknown function within the file /usr/sbin/http_eshell_server of the DOCKER Feature component, where manipulation of the "params" argument enables arbitrary command execution. It is associated with CWEs-74 and CWE-77 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

The vulnerability is exploitable remotely by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to inject and execute arbitrary commands on the affected system, potentially leading to full compromise with high impacts on confidentiality, integrity, and availability.

Advisories from VulDB detail the issue and note that the vendor was contacted early for disclosure but provided no response. No patches or specific mitigations are referenced in the available information.

An exploit for this vulnerability has been publicly released, heightening the potential for real-world attacks.

Details

CWE(s)

Affected Products

sgwbox
n3 firmware
≤ 2.0.25

CVEs Like This One

CVE-2025-14705Same product: Sgwbox N3
CVE-2025-14706Same product: Sgwbox N3
CVE-2025-14709Same product: Sgwbox N3
CVE-2025-14708Same product: Sgwbox N3
CVE-2025-14704Same product: Sgwbox N3
CVE-2025-7525Shared CWE-74, CWE-77
CVE-2025-13800Shared CWE-74, CWE-77
CVE-2025-9581Shared CWE-74, CWE-77
CVE-2025-12916Shared CWE-74, CWE-77
CVE-2025-10689Shared CWE-74, CWE-77

References