Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-12946


A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.5, indicating it requires adjacent network access but requires specific conditions to be met without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 36 products from netgear, from netgear, from netgear and 33 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2025, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2025-12-09T17:15:48.820

Last Modified

2026-01-21T19:29:14.017

Status

Analyzed

Source

a2826606-91e7-4eb6-899e-8484bd4575d5

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System netgear rs700_firmware < 1.0.9.6 Yes
Hardware netgear rs700 - No
Operating System netgear rax54sv2_firmware < 1.1.6.36 Yes
Hardware netgear rax54sv2 - No
Operating System netgear rax45v2_firmware < 1.1.6.36 Yes
Hardware netgear rax45v2 - No
Operating System netgear rax41v2_firmware < 1.1.6.36 Yes
Hardware netgear rax41v2 - No
Operating System netgear rax50_firmware < 1.2.14.114 Yes
Hardware netgear rax50 - No
Operating System netgear raxe500_firmware < 1.2.14.114 Yes
Hardware netgear raxe500 - No
Operating System netgear rax41_firmware < 1.0.17.142 Yes
Hardware netgear rax41 - No
Operating System netgear rax43_firmware < 1.0.17.142 Yes
Hardware netgear rax43 - No
Operating System netgear rax35v2_firmware < 1.0.17.142 Yes
Hardware netgear rax35v2 - No
Operating System netgear raxe450_firmware < 1.0.17.142 Yes
Hardware netgear raxe450 - No
Operating System netgear rax43v2_firmware < 1.1.6.36 Yes
Hardware netgear rax43v2 - No
Operating System netgear rax42_firmware < 1.0.17.142 Yes
Hardware netgear rax42 - No
Operating System netgear rax45_firmware < 1.0.17.142 Yes
Hardware netgear rax45 - No
Operating System netgear rax50v2_firmware < 1.1.6.36 Yes
Hardware netgear rax50v2 - No
Operating System netgear mr90_firmware < 1.0.2.46 Yes
Hardware netgear mr90 - No
Operating System netgear ms90_firmware < 1.0.2.46 Yes
Hardware netgear ms90 - No
Operating System netgear rax42v2_firmware < 1.1.6.36 Yes
Hardware netgear rax42v2 - No
Operating System netgear rax49s_firmware < 1.1.6.36 Yes
Hardware netgear rax49s - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For netgear's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.