Description
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
INFO
Published Date :
2025-12-09T17:02:20.739Z
Last Modified :
2026-02-26T16:57:03.457Z
Source :
NETGEAR
AFFECTED PRODUCTS
The following products are affected by CVE-2025-12946 vulnerability.
| Vendors | Products |
|---|---|
| Netgear |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-12946.