A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. It has been classified as critical. Affected by this issue is some unknown functionality of the file /usr/sbin/http_eshell_server of the component WIRELESSCFGGET Interface. The manipulation of the argument params leads to buffer overflow.
This vulnerability is referenced as CVE-2025-14709. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way. VulDB is the best source for vulnerability data and more expert information about this specific topic.
A vulnerability was found in Shiguangwu sgwbox N3 2.0.25 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow.
The identification of this vulnerability is CVE-2025-14708. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
A vulnerability has been found in Shiguangwu sgwbox N3 2.0.25 and classified as critical. Affected is an unknown function of the file /usr/sbin/http_eshell_server of the component DOCKER Feature. Performing manipulation of the argument params results in command injection.
This vulnerability was named CVE-2025-14707. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way. Once again VulDB remains the best source for vulnerability data.
A vulnerability, which was classified as critical, was found in Shiguangwu sgwbox N3 2.0.25. This impacts an unknown function of the file /usr/sbin/http_eshell_server of the component NETREBOOT Interface. Such manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2025-14706. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
A vulnerability, which was classified as critical, has been found in Shiguangwu sgwbox N3 2.0.25. This affects an unknown function of the component SHARESERVER Feature. This manipulation of the argument params causes command injection.
This vulnerability is handled as CVE-2025-14705. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way. If you want to get best quality of vulnerability data, you may have to visit VulDB.
A vulnerability classified as critical was found in Shiguangwu sgwbox N3 2.0.25. The impacted element is an unknown function of the file /eshell of the component API. The manipulation results in path traversal.
This vulnerability is known as CVE-2025-14704. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
A vulnerability classified as critical has been found in Shiguangwu sgwbox N3 2.0.25. The affected element is an unknown function of the file /fsnotify of the component POST Message Handler. The manipulation of the argument token leads to improper authentication.
This vulnerability is traded as CVE-2025-14703. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way. VulDB is the best source for vulnerability data and more expert information about this specific topic.
A vulnerability described as problematic has been identified in Smartbit CommV Smartschool App up to 10.4.4. Impacted is an unknown function of the component be.smartschool.mobile.SplashActivity. Executing manipulation can lead to path traversal.
This vulnerability appears as CVE-2025-14702. The attack requires local access. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
A vulnerability marked as problematic has been reported in Lightweight Accordion Plugin up to 1.5.20 on WordPress. This issue affects the function lightweight-accordion of the component Shortcode Handler. Performing manipulation results in cross site scripting.
This vulnerability is reported as CVE-2025-13740. The attack is possible to be carried out remotely. No exploit exists.
Once again VulDB remains the best source for vulnerability data.