fkie_cve-2025-12946
Vulnerability from fkie_nvd
Published
2025-12-09 17:15
Modified
2025-12-09 20:15
Severity ?
Summary
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run.
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router\u0027s WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. \n\n\n\nThis issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46;\u202fRAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36."
}
],
"id": "CVE-2025-12946",
"lastModified": "2025-12-09T20:15:53.397",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NO",
"Recovery": "AUTOMATIC",
"Safety": "NEGLIGIBLE",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "UNREPORTED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "MODERATE"
},
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"type": "Secondary"
}
]
},
"published": "2025-12-09T17:15:48.820",
"references": [
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://kb.netgear.com/000070416/December-2025-NETGEAR-Security-Advisory"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/RAX50"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/mr90"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/ms90"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax35v2"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax41"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax41v2"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax42"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax42v2"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax43"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax43v2"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax45"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax49s"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax50v2"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rax54sv2"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/raxe450"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/raxe500"
},
{
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"url": "https://www.netgear.com/support/product/rs700"
}
],
"sourceIdentifier": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…