{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14704","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-14T19:00:57.020Z","datePublished":"2025-12-15T04:32:07.225Z","dateUpdated":"2025-12-15T18:14:07.935Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-15T04:32:07.225Z"},"title":"Shiguangwu sgwbox N3 API eshell path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Shiguangwu","product":"sgwbox N3","versions":[{"version":"2.0.25","status":"affected"}],"modules":["API"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. The impacted element is an unknown function of the file /eshell of the component API. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-14T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-14T20:06:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"rgyue (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.336421","name":"VDB-336421 | Shiguangwu sgwbox N3 API eshell path traversal","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.336421","name":"VDB-336421 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.706915","name":"Submit #706915 | sgwbox N3 NAS V2.0.25 Directory Traversal","tags":["third-party-advisory"]},{"url":"https://www.notion.so/sgwbox-NAS-N3-Directory-Traversal-2be6cf4e528a802a9c0ad6f01b75694e?source=copy_link","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-15T18:13:00.399371Z","id":"CVE-2025-14704","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-15T18:14:07.935Z"}}]}}