Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12943: CWE-295 Improper Certificate Validation in NETGEAR RAX30

0
Medium
VulnerabilityCVE-2025-12943cvecve-2025-12943cwe-295
Published: Tue Nov 11 2025 (11/11/2025, 16:17:44 UTC)
Source: CVE Database V5
Vendor/Project: NETGEAR
Product: RAX30

Description

Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router) allows attackers with the ability to intercept and tamper traffic destined to the device to execute arbitrary commands on the device. Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update to the latest. Fixed in: RAX30 firmware 1.0.14.108 or later. RAXE300 firmware 1.0.9.82 or later

AI-Powered Analysis

AILast updated: 01/07/2026, 19:28:15 UTC

Technical Analysis

CVE-2025-12943 is a vulnerability categorized under CWE-295 (Improper Certificate Validation) affecting NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router). The flaw exists in the firmware update mechanism where the device fails to correctly validate the digital certificates used to authenticate firmware updates. This improper validation enables an attacker with the capability to intercept and tamper with network traffic destined for the device to perform a man-in-the-middle (MitM) attack. By exploiting this, the attacker can inject malicious firmware or commands, leading to arbitrary code execution on the router. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The CVSS 4.0 score is 5.2 (medium), reflecting the attack vector as adjacent network (AV:A), low attack complexity, no privileges required, no user interaction, but with high impact on confidentiality, integrity, and availability. The issue has been addressed in firmware versions 1.0.14.108 for RAX30 and 1.0.9.82 for RAXE300. Devices with automatic updates enabled may have already received the patch, but manual verification is advised. No public exploits or active attacks have been reported to date.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Exploitation could lead to unauthorized control over critical network infrastructure, enabling attackers to intercept sensitive data, disrupt network availability, or pivot to internal systems. Given the widespread use of NETGEAR routers in small to medium enterprises and home office environments across Europe, compromised devices could serve as entry points for broader attacks. The ability to execute arbitrary commands without authentication increases the threat level, particularly in environments where these routers are deployed at network edges or in less monitored segments. The impact extends to confidentiality breaches, potential data exfiltration, and integrity violations of network traffic. Additionally, compromised routers could be leveraged for launching further attacks such as distributed denial-of-service (DDoS) or lateral movement within corporate networks. The medium severity rating suggests that while the vulnerability is serious, exploitation requires network proximity or MitM capability, somewhat limiting the attack scope but not eliminating the risk.

Mitigation Recommendations

European organizations should immediately verify the firmware versions of their NETGEAR RAX30 and RAXE300 devices and update to the fixed versions (1.0.14.108 for RAX30 and 1.0.9.82 for RAXE300) if not already applied. For devices with automatic updates disabled, enable this feature to ensure timely patch deployment. Network administrators should implement network segmentation and isolate management interfaces of these routers to reduce exposure to potential MitM attacks. Deploying strong encryption protocols such as WPA3 and using VPNs for remote management can further mitigate interception risks. Monitoring network traffic for anomalies and unusual firmware update attempts can help detect exploitation attempts early. Additionally, organizations should consider replacing vulnerable devices if firmware updates are not feasible or if devices are end-of-life. Training IT staff to recognize signs of router compromise and maintaining an inventory of network devices will improve incident response readiness. Finally, coordinate with NETGEAR support for any additional security advisories or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NETGEAR
Date Reserved
2025-11-10T07:35:29.116Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136629f922b639ab601262

Added to database: 11/11/2025, 4:36:57 PM

Last enriched: 1/7/2026, 7:28:15 PM

Last updated: 1/8/2026, 7:07:35 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats