A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run.
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
CVSS
No CVSS.
References
Configurations
No configuration.
History
09 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 17:15
Updated : 2025-12-09 20:15
NVD link : CVE-2025-12946
Mitre link : CVE-2025-12946
CVE.ORG link : CVE-2025-12946
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation
