Vulnerability Details CVE-2025-12946
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run.
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 24.4%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-12946
-
-
-
cpe:2.3:h:netgear:rax35v2:-
-
cpe:2.3:h:netgear:rax41:-
-
cpe:2.3:h:netgear:rax41v2:-
-
cpe:2.3:h:netgear:rax42:-
-
cpe:2.3:h:netgear:rax42v2:-
-
cpe:2.3:h:netgear:rax43:-
-
cpe:2.3:h:netgear:rax43v2:-
-
cpe:2.3:h:netgear:rax45:-
-
cpe:2.3:h:netgear:rax45v2:-
-
cpe:2.3:h:netgear:rax49s:-
-
cpe:2.3:h:netgear:rax50:-
-
cpe:2.3:h:netgear:rax50v2:-
-
cpe:2.3:h:netgear:rax54sv2:-
-
cpe:2.3:h:netgear:raxe450:-
-
cpe:2.3:h:netgear:raxe500:-
-
cpe:2.3:h:netgear:rs700:-
-
cpe:2.3:o:netgear:mr90_firmware:1.0.1.36
-
cpe:2.3:o:netgear:mr90_firmware:1.0.2.38
-
cpe:2.3:o:netgear:ms90_firmware:1.0.1.36
-
cpe:2.3:o:netgear:ms90_firmware:1.0.2.38
-
cpe:2.3:o:netgear:rax35v2_firmware:-
-
cpe:2.3:o:netgear:rax35v2_firmware:1.0.3.96
-
cpe:2.3:o:netgear:rax35v2_firmware:1.0.4.100
-
cpe:2.3:o:netgear:rax41_firmware:*
-
cpe:2.3:o:netgear:rax41v2_firmware:*
-
cpe:2.3:o:netgear:rax42_firmware:-
-
cpe:2.3:o:netgear:rax42_firmware:1.0.10.110
-
cpe:2.3:o:netgear:rax42_firmware:1.0.4.100
-
cpe:2.3:o:netgear:rax42v2_firmware:*
-
cpe:2.3:o:netgear:rax43_firmware:-
-
cpe:2.3:o:netgear:rax43_firmware:1.0.10.110
-
cpe:2.3:o:netgear:rax43_firmware:1.0.3.96
-
cpe:2.3:o:netgear:rax43_firmware:1.0.4.100
-
cpe:2.3:o:netgear:rax43v2_firmware:*
-
cpe:2.3:o:netgear:rax45_firmware:-
-
cpe:2.3:o:netgear:rax45_firmware:1.0.10.110
-
cpe:2.3:o:netgear:rax45_firmware:1.0.2.28
-
cpe:2.3:o:netgear:rax45_firmware:1.0.2.32
-
cpe:2.3:o:netgear:rax45_firmware:1.0.2.64
-
cpe:2.3:o:netgear:rax45_firmware:1.0.2.66
-
cpe:2.3:o:netgear:rax45_firmware:1.0.2.72
-
cpe:2.3:o:netgear:rax45_firmware:1.0.2.82
-
cpe:2.3:o:netgear:rax45_firmware:1.0.3.96
-
cpe:2.3:o:netgear:rax45_firmware:1.0.4.100
-
cpe:2.3:o:netgear:rax45v2_firmware:*
-
cpe:2.3:o:netgear:rax49s_firmware:*
-
cpe:2.3:o:netgear:rax50_firmware:-
-
cpe:2.3:o:netgear:rax50_firmware:1.0.10.110
-
cpe:2.3:o:netgear:rax50_firmware:1.0.12.120
-
cpe:2.3:o:netgear:rax50_firmware:1.0.15.128
-
cpe:2.3:o:netgear:rax50_firmware:1.0.16.132
-
cpe:2.3:o:netgear:rax50_firmware:1.0.17.142
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.26
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.28
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.32
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.64
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.66
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.72
-
cpe:2.3:o:netgear:rax50_firmware:1.0.2.82
-
cpe:2.3:o:netgear:rax50_firmware:1.0.3.96
-
cpe:2.3:o:netgear:rax50_firmware:1.0.4.100
-
cpe:2.3:o:netgear:rax50_firmware:1.0.5.106
-
cpe:2.3:o:netgear:rax50v2_firmware:*
-
cpe:2.3:o:netgear:rax54sv2_firmware:*
-
cpe:2.3:o:netgear:raxe450_firmware:-
-
cpe:2.3:o:netgear:raxe450_firmware:1.0.8.70
-
cpe:2.3:o:netgear:raxe500_firmware:-
-
cpe:2.3:o:netgear:raxe500_firmware:1.0.8.70
-
cpe:2.3:o:netgear:rs700_firmware:*