CVE-2025-12946
Severity CVSS v4.0:
MEDIUM
Type:
CWE-20
Input Validation
Publication date:
09/12/2025
Last modified:
21/01/2026
Description
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router&#39;s WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. <br />
<br />
<br />
<br />
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
Impact
Base Score 4.0
4.40
Severity 4.0
MEDIUM
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:netgear:rs700_firmware:*:*:*:*:*:*:*:* | 1.0.9.6 (excluding) | |
| cpe:2.3:h:netgear:rs700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax54sv2_firmware:*:*:*:*:*:*:*:* | 1.1.6.36 (excluding) | |
| cpe:2.3:h:netgear:rax54sv2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax45v2_firmware:*:*:*:*:*:*:*:* | 1.1.6.36 (excluding) | |
| cpe:2.3:h:netgear:rax45v2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax41v2_firmware:*:*:*:*:*:*:*:* | 1.1.6.36 (excluding) | |
| cpe:2.3:h:netgear:rax41v2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:* | 1.2.14.114 (excluding) | |
| cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:raxe500_firmware:*:*:*:*:*:*:*:* | 1.2.14.114 (excluding) | |
| cpe:2.3:h:netgear:raxe500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax41_firmware:*:*:*:*:*:*:*:* | 1.0.17.142 (excluding) | |
| cpe:2.3:h:netgear:rax41:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:* | 1.0.17.142 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://kb.netgear.com/000070416/December-2025-NETGEAR-Security-Advisory
- https://www.netgear.com/support/product/RAX50
- https://www.netgear.com/support/product/mr90
- https://www.netgear.com/support/product/ms90
- https://www.netgear.com/support/product/rax35v2
- https://www.netgear.com/support/product/rax41
- https://www.netgear.com/support/product/rax41v2
- https://www.netgear.com/support/product/rax42
- https://www.netgear.com/support/product/rax42v2
- https://www.netgear.com/support/product/rax43
- https://www.netgear.com/support/product/rax43v2
- https://www.netgear.com/support/product/rax45
- https://www.netgear.com/support/product/rax49s
- https://www.netgear.com/support/product/rax50v2
- https://www.netgear.com/support/product/rax54sv2
- https://www.netgear.com/support/product/raxe450
- https://www.netgear.com/support/product/raxe500
- https://www.netgear.com/support/product/rs700



