Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-14708 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Buffer Overflow in SGWBox N3 NAS. πŸ“‰ **Consequences**: Full system compromise. The flaw lies in `/usr/sbin/http_eshell_server` handling `params`. πŸ’₯ **Impact**: High (CVSS 9.8).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-120 (Buffer Copy without Checking Size of Input). πŸ” **Flaw**: Improper parameter handling in the `http_eshell_server` binary. πŸ“ **Detail**: Unchecked input leads to memory corruption.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Shiguangwu (SGWBox). πŸ“¦ **Product**: SGWBox N3 Network Storage. πŸ“… **Affected Version**: Specifically **v2.0.25**. ⚠️ **Scope**: Network-attached storage devices running this firmware.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Remote Code Execution (RCE). πŸ—οΈ **Access**: No authentication required (PR:N). πŸ“‚ **Data**: Full read/write access to the device. 🌐 **Control**: Complete takeover of the NAS system.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth**: None Required (PR:N). 🌍 **Network**: Network Accessible (AV:N). 🎯 **Complexity**: Low (AC:L). πŸš€ **Threshold**: **Extremely Low**. Any attacker on the network can exploit this easily.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exploit**: Yes. πŸ”— **Reference**: Notion link provided in data. 🌐 **Status**: Active exploitation indicators exist (VDB-336425). ⚑ **Risk**: Wild exploitation is highly probable given low barrier.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for SGWBox N3 devices. πŸ“‚ **Target**: Look for `/usr/sbin/http_eshell_server`. πŸ“‘ **Method**: Send malformed `params` to the service. πŸ› οΈ **Tool**: Use existing PoC from the Notion reference.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Patch**: Not explicitly mentioned in data. πŸ“… **Published**: 2025-12-15. ⏳ **Status**: Likely **Unpatched** or requires vendor update. πŸ“ž **Action**: Contact Shiguangwu support immediately.

Q9What if no patch? (Workaround)

🚫 **Workaround**: Block network access to the device. πŸ›‘ **Isolate**: Disconnect from the internet/public network. 🧱 **Firewall**: Restrict access to trusted IPs only.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL** (P1). 🚨 **Urgency**: Immediate action required. πŸ“‰ **CVSS**: 9.8 (Critical). ⚑ **Reason**: Unauthenticated RCE with low complexity. πŸƒ **Action**: Patch or isolate NOW.