CVE-2025-12946

Published Dec 9, 2025

Last updated 3 months ago

Overview

Description
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
Source
a2826606-91e7-4eb6-899e-8484bd4575d5
NVD status
Analyzed
Products
rs700_firmware, rax54sv2_firmware, rax45v2_firmware, rax41v2_firmware, rax50_firmware, raxe500_firmware, rax41_firmware, rax43_firmware, rax35v2_firmware, raxe450_firmware, rax43v2_firmware, rax42_firmware, rax45_firmware, rax50v2_firmware, mr90_firmware, ms90_firmware, rax42v2_firmware, rax49s_firmware

Risk scores

CVSS 4.0

Type
Secondary
Base score
4.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:D/RE:M/U:Amber
Severity
MEDIUM

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
5.9
Exploitability score
1.6
Vector string
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

a2826606-91e7-4eb6-899e-8484bd4575d5
CWE-20
nvd@nist.gov
NVD-CWE-noinfo

Social media

Hype score
Not currently trending

Configurations