A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
History

Wed, 21 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Netgear mr90 Firmware
Netgear ms90 Firmware
Netgear rax35v2 Firmware
Netgear rax41 Firmware
Netgear rax41v2 Firmware
Netgear rax42 Firmware
Netgear rax42v2 Firmware
Netgear rax43 Firmware
Netgear rax43v2 Firmware
Netgear rax45 Firmware
Netgear rax45v2
Netgear rax45v2 Firmware
Netgear rax49s Firmware
Netgear rax50 Firmware
Netgear rax50v2 Firmware
Netgear rax54sv2 Firmware
Netgear raxe450 Firmware
Netgear raxe500 Firmware
Netgear rs700 Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:netgear:mr90:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms90:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax35v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax41:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax41v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax42:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax42v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax45v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax49s:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax50v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax54sv2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:raxe450:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:raxe500:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rs700:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:mr90_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ms90_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax41_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax41v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax42_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax42v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax43v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax45v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax49s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax50v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax54sv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:raxe450_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:raxe500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rs700_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear mr90 Firmware
Netgear ms90 Firmware
Netgear rax35v2 Firmware
Netgear rax41 Firmware
Netgear rax41v2 Firmware
Netgear rax42 Firmware
Netgear rax42v2 Firmware
Netgear rax43 Firmware
Netgear rax43v2 Firmware
Netgear rax45 Firmware
Netgear rax45v2
Netgear rax45v2 Firmware
Netgear rax49s Firmware
Netgear rax50 Firmware
Netgear rax50v2 Firmware
Netgear rax54sv2 Firmware
Netgear raxe450 Firmware
Netgear raxe500 Firmware
Netgear rs700 Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 09 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 19:45:00 +0000


Tue, 09 Dec 2025 18:30:00 +0000


Tue, 09 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
Title Improper input validation in NETGEAR Nighthawk routers
First Time appeared Netgear
Netgear mr90
Netgear ms90
Netgear rax35v2
Netgear rax41
Netgear rax41v2
Netgear rax42
Netgear rax42v2
Netgear rax43
Netgear rax43v2
Netgear rax45
Netgear rax49s
Netgear rax50
Netgear rax50v2
Netgear rax54sv2
Netgear raxe450
Netgear raxe500
Netgear rs700
Weaknesses CWE-20
CPEs cpe:2.3:h:netgear:mr90:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms90:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax35v2:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax41:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax41v2:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax42:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax42v2:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43v2:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax45:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax49s:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax50:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax50v2:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax54sv2:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:raxe450:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:raxe500:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rs700:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear mr90
Netgear ms90
Netgear rax35v2
Netgear rax41
Netgear rax41v2
Netgear rax42
Netgear rax42v2
Netgear rax43
Netgear rax43v2
Netgear rax45
Netgear rax49s
Netgear rax50
Netgear rax50v2
Netgear rax54sv2
Netgear raxe450
Netgear raxe500
Netgear rs700
References
Metrics cvssV4_0

{'score': 4.4, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/S:N/AU:N/R:A/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NETGEAR

Published: 2025-12-09T17:02:20.739Z

Updated: 2025-12-10T04:57:22.798Z

Reserved: 2025-11-10T08:26:32.586Z

Link: CVE-2025-12946

cve-icon Vulnrichment

Updated: 2025-12-09T20:22:16.677Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T17:15:48.820

Modified: 2026-01-21T19:29:14.017

Link: CVE-2025-12946

cve-icon Redhat

No data.