<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE-2025-14705 on 办公AI智能小助手</title>
    <link>https://blog.qife122.com/tags/cve-2025-14705/</link>
    <description>Recent content in CVE-2025-14705 on 办公AI智能小助手</description>
    <generator>Hugo</generator>
    <language>zh-cn</language>
    <copyright>qife</copyright>
    <lastBuildDate>Mon, 05 Jan 2026 13:45:46 +0800</lastBuildDate>
    <atom:link href="https://blog.qife122.com/tags/cve-2025-14705/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>高危漏洞预警：曙光屋sgwbox N3设备SHARESERVER功能中的远程命令注入</title>
      <link>https://blog.qife122.com/p/%E9%AB%98%E5%8D%B1%E6%BC%8F%E6%B4%9E%E9%A2%84%E8%AD%A6%E6%9B%99%E5%85%89%E5%B1%8Bsgwbox-n3%E8%AE%BE%E5%A4%87shareserver%E5%8A%9F%E8%83%BD%E4%B8%AD%E7%9A%84%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5/</link>
      <pubDate>Mon, 05 Jan 2026 13:45:46 +0800</pubDate>
      <guid>https://blog.qife122.com/p/%E9%AB%98%E5%8D%B1%E6%BC%8F%E6%B4%9E%E9%A2%84%E8%AD%A6%E6%9B%99%E5%85%89%E5%B1%8Bsgwbox-n3%E8%AE%BE%E5%A4%87shareserver%E5%8A%9F%E8%83%BD%E4%B8%AD%E7%9A%84%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5/</guid>
      <description>&lt;h2 id=&#34;cve-2025-14705曙光屋-sgwbox-n3-中的命令注入漏洞&#34;&gt;CVE-2025-14705：曙光屋 sgwbox N3 中的命令注入漏洞&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;严重性：严重&lt;/strong&gt;&#xA;&lt;strong&gt;类型：漏洞&lt;/strong&gt;&#xA;&lt;strong&gt;CVE编号：&lt;/strong&gt; CVE-2025-14705&lt;/p&gt;&#xA;&lt;p&gt;CVE-2025-14705 是曙光屋 sgwbox N3 版本 2.0.25 中的一个关键命令注入漏洞， specifically affecting the SHARESERVER feature. The flaw allows unauthenticated remote attackers to execute arbitrary commands by manipulating input parameters, without requiring user interaction. The vulnerability has a high CVSS 4.0 score of 9.3, reflecting its severe impact on confidentiality, integrity, and availability. Although the vendor was notified, no patch or response has been provided, and public exploit details are available, increasing the risk of exploitation. European organizations using this device, particularly in sectors relying on this hardware for network or file sharing services, face significant risks including system compromise and data breaches. Mitigation requires immediate network-level restrictions, disabling or isolating the vulnerable feature, and monitoring for suspicious activity.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
