CVE-2025-12946
EUVD-2025-20228309.12.2025, 17:15
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| netgear | rs700_firmware | 𝑥 < 1.0.9.6 |
| netgear | rax54sv2_firmware | 𝑥 < 1.1.6.36 |
| netgear | rax45v2_firmware | 𝑥 < 1.1.6.36 |
| netgear | rax41v2_firmware | 𝑥 < 1.1.6.36 |
| netgear | rax50_firmware | 𝑥 < 1.2.14.114 |
| netgear | raxe500_firmware | 𝑥 < 1.2.14.114 |
| netgear | rax41_firmware | 𝑥 < 1.0.17.142 |
| netgear | rax43_firmware | 𝑥 < 1.0.17.142 |
| netgear | rax35v2_firmware | 𝑥 < 1.0.17.142 |
| netgear | raxe450_firmware | 𝑥 < 1.0.17.142 |
| netgear | rax43v2_firmware | 𝑥 < 1.1.6.36 |
| netgear | rax42_firmware | 𝑥 < 1.0.17.142 |
| netgear | rax45_firmware | 𝑥 < 1.0.17.142 |
| netgear | rax50v2_firmware | 𝑥 < 1.1.6.36 |
| netgear | mr90_firmware | 𝑥 < 1.0.2.46 |
| netgear | ms90_firmware | 𝑥 < 1.0.2.46 |
| netgear | rax42v2_firmware | 𝑥 < 1.1.6.36 |
| netgear | rax49s_firmware | 𝑥 < 1.1.6.36 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References