Vulnerability Description
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Rs700 Firmware | < 1.0.9.6 |
| Netgear | Rs700 | - |
| Netgear | Rax54Sv2 Firmware | < 1.1.6.36 |
| Netgear | Rax54Sv2 | - |
| Netgear | Rax45V2 Firmware | < 1.1.6.36 |
| Netgear | Rax45V2 | - |
| Netgear | Rax41V2 Firmware | < 1.1.6.36 |
| Netgear | Rax41V2 | - |
| Netgear | Rax50 Firmware | < 1.2.14.114 |
| Netgear | Rax50 | - |
| Netgear | Raxe500 Firmware | < 1.2.14.114 |
| Netgear | Raxe500 | - |
| Netgear | Rax41 Firmware | < 1.0.17.142 |
| Netgear | Rax41 | - |
| Netgear | Rax43 Firmware | < 1.0.17.142 |
| Netgear | Rax43 | - |
| Netgear | Rax35V2 Firmware | < 1.0.17.142 |
| Netgear | Rax35V2 | - |
| Netgear | Raxe450 Firmware | < 1.0.17.142 |
| Netgear | Raxe450 | - |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000070416/December-2025-NETGEAR-Security-AdvisoryPatchVendor Advisory
- https://www.netgear.com/support/product/RAX50PatchProduct
- https://www.netgear.com/support/product/mr90PatchProduct
- https://www.netgear.com/support/product/ms90PatchProduct
- https://www.netgear.com/support/product/rax35v2PatchProduct
- https://www.netgear.com/support/product/rax41PatchProduct
- https://www.netgear.com/support/product/rax41v2PatchProduct
- https://www.netgear.com/support/product/rax42PatchProduct
- https://www.netgear.com/support/product/rax42v2PatchProduct
- https://www.netgear.com/support/product/rax43PatchProduct
- https://www.netgear.com/support/product/rax43v2PatchProduct
- https://www.netgear.com/support/product/rax45PatchProduct
- https://www.netgear.com/support/product/rax49sPatchProduct
- https://www.netgear.com/support/product/rax50v2PatchProduct
- https://www.netgear.com/support/product/rax54sv2PatchProduct
FAQ
What is CVE-2025-12946?
CVE-2025-12946 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniqu...
How severe is CVE-2025-12946?
CVE-2025-12946 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-12946?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Rs700 Firmware, Netgear Rs700, Netgear Rax54Sv2 Firmware, Netgear Rax54Sv2, Netgear Rax45V2 Firmware.