CVE-2025-12946
Gravedad CVSS v4.0:
MEDIA
Tipo:
CWE-20
Validación incorrecta de entrada
Fecha de publicación:
09/12/2025
Última modificación:
21/01/2026
Descripción
*** Pendiente de traducción *** A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router&#39;s WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. <br />
<br />
<br />
<br />
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
Impacto
Puntuación base 4.0
4.40
Gravedad 4.0
MEDIA
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:netgear:rs700_firmware:*:*:*:*:*:*:*:* | 1.0.9.6 (excluyendo) | |
| cpe:2.3:h:netgear:rs700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax54sv2_firmware:*:*:*:*:*:*:*:* | 1.1.6.36 (excluyendo) | |
| cpe:2.3:h:netgear:rax54sv2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax45v2_firmware:*:*:*:*:*:*:*:* | 1.1.6.36 (excluyendo) | |
| cpe:2.3:h:netgear:rax45v2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax41v2_firmware:*:*:*:*:*:*:*:* | 1.1.6.36 (excluyendo) | |
| cpe:2.3:h:netgear:rax41v2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:* | 1.2.14.114 (excluyendo) | |
| cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:raxe500_firmware:*:*:*:*:*:*:*:* | 1.2.14.114 (excluyendo) | |
| cpe:2.3:h:netgear:raxe500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax41_firmware:*:*:*:*:*:*:*:* | 1.0.17.142 (excluyendo) | |
| cpe:2.3:h:netgear:rax41:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:* | 1.0.17.142 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://kb.netgear.com/000070416/December-2025-NETGEAR-Security-Advisory
- https://www.netgear.com/support/product/RAX50
- https://www.netgear.com/support/product/mr90
- https://www.netgear.com/support/product/ms90
- https://www.netgear.com/support/product/rax35v2
- https://www.netgear.com/support/product/rax41
- https://www.netgear.com/support/product/rax41v2
- https://www.netgear.com/support/product/rax42
- https://www.netgear.com/support/product/rax42v2
- https://www.netgear.com/support/product/rax43
- https://www.netgear.com/support/product/rax43v2
- https://www.netgear.com/support/product/rax45
- https://www.netgear.com/support/product/rax49s
- https://www.netgear.com/support/product/rax50v2
- https://www.netgear.com/support/product/rax54sv2
- https://www.netgear.com/support/product/raxe450
- https://www.netgear.com/support/product/raxe500
- https://www.netgear.com/support/product/rs700



