CVE-2025-12943: CWE-295 Improper Certificate Validation in NETGEAR RAX30
Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router) allows attackers with the ability to intercept and tamper traffic destined to the device to execute arbitrary commands on the device. Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update to the latest. Fixed in: RAX30 firmware 1.0.14.108 or later. RAXE300 firmware 1.0.9.82 or later
AI Analysis
Technical Summary
CVE-2025-12943 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in the firmware update logic of NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router). The core issue is that the devices do not correctly validate the authenticity of certificates during the firmware update process. This improper validation allows an attacker with the capability to intercept and manipulate network traffic—such as via a man-in-the-middle (MitM) attack—to inject malicious firmware or commands. Successful exploitation leads to arbitrary command execution on the device, potentially allowing full control over the router. The vulnerability is particularly dangerous because it does not require any authentication or user interaction, only network access sufficient to intercept traffic destined for the device. The CVSS v4.0 score is 5.2 (medium), reflecting the attack vector as adjacent network, low attack complexity, no privileges required, and no user interaction, but with high impact on confidentiality, integrity, and availability. NETGEAR has addressed this issue in firmware versions 1.0.14.108 for RAX30 and 1.0.9.82 for RAXE300. Devices with automatic updates enabled may already be patched, but manual verification and updating are recommended. No known exploits have been reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure security, especially in environments where NETGEAR RAX30 or RAXE300 routers are deployed. Exploitation could lead to unauthorized control over routers, enabling attackers to intercept, modify, or redirect network traffic, potentially compromising sensitive data confidentiality and integrity. It could also disrupt network availability by causing device malfunction or denial of service. Given the widespread use of these routers in small to medium enterprises and home office setups, the vulnerability could serve as a foothold for lateral movement into corporate networks. The ability to execute arbitrary commands without authentication increases the risk of persistent compromise and deployment of further malware or ransomware. The threat is exacerbated in scenarios where network segmentation is weak or where these devices serve as primary gateways to critical systems.
Mitigation Recommendations
European organizations should immediately verify the firmware versions of all NETGEAR RAX30 and RAXE300 devices and update them to at least versions 1.0.14.108 and 1.0.9.82 respectively. For devices with automatic updates disabled, enable this feature or implement scheduled manual update checks. Network administrators should monitor network traffic for signs of MitM attacks, such as unexpected certificate changes or unusual firmware update requests. Employ network segmentation to isolate router management interfaces from general user traffic and restrict access to trusted administrators only. Use encrypted management protocols (e.g., SSH, HTTPS) and strong authentication mechanisms for router access. Additionally, consider deploying network intrusion detection systems (NIDS) to detect anomalous activities related to firmware updates. Regularly audit device configurations and logs for unauthorized changes. Finally, educate users and administrators about the risks of connecting to untrusted networks where MitM attacks are more feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-12943: CWE-295 Improper Certificate Validation in NETGEAR RAX30
Description
Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router) allows attackers with the ability to intercept and tamper traffic destined to the device to execute arbitrary commands on the device. Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update to the latest. Fixed in: RAX30 firmware 1.0.14.108 or later. RAXE300 firmware 1.0.9.82 or later
AI-Powered Analysis
Technical Analysis
CVE-2025-12943 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in the firmware update logic of NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router). The core issue is that the devices do not correctly validate the authenticity of certificates during the firmware update process. This improper validation allows an attacker with the capability to intercept and manipulate network traffic—such as via a man-in-the-middle (MitM) attack—to inject malicious firmware or commands. Successful exploitation leads to arbitrary command execution on the device, potentially allowing full control over the router. The vulnerability is particularly dangerous because it does not require any authentication or user interaction, only network access sufficient to intercept traffic destined for the device. The CVSS v4.0 score is 5.2 (medium), reflecting the attack vector as adjacent network, low attack complexity, no privileges required, and no user interaction, but with high impact on confidentiality, integrity, and availability. NETGEAR has addressed this issue in firmware versions 1.0.14.108 for RAX30 and 1.0.9.82 for RAXE300. Devices with automatic updates enabled may already be patched, but manual verification and updating are recommended. No known exploits have been reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure security, especially in environments where NETGEAR RAX30 or RAXE300 routers are deployed. Exploitation could lead to unauthorized control over routers, enabling attackers to intercept, modify, or redirect network traffic, potentially compromising sensitive data confidentiality and integrity. It could also disrupt network availability by causing device malfunction or denial of service. Given the widespread use of these routers in small to medium enterprises and home office setups, the vulnerability could serve as a foothold for lateral movement into corporate networks. The ability to execute arbitrary commands without authentication increases the risk of persistent compromise and deployment of further malware or ransomware. The threat is exacerbated in scenarios where network segmentation is weak or where these devices serve as primary gateways to critical systems.
Mitigation Recommendations
European organizations should immediately verify the firmware versions of all NETGEAR RAX30 and RAXE300 devices and update them to at least versions 1.0.14.108 and 1.0.9.82 respectively. For devices with automatic updates disabled, enable this feature or implement scheduled manual update checks. Network administrators should monitor network traffic for signs of MitM attacks, such as unexpected certificate changes or unusual firmware update requests. Employ network segmentation to isolate router management interfaces from general user traffic and restrict access to trusted administrators only. Use encrypted management protocols (e.g., SSH, HTTPS) and strong authentication mechanisms for router access. Additionally, consider deploying network intrusion detection systems (NIDS) to detect anomalous activities related to firmware updates. Regularly audit device configurations and logs for unauthorized changes. Finally, educate users and administrators about the risks of connecting to untrusted networks where MitM attacks are more feasible.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NETGEAR
- Date Reserved
- 2025-11-10T07:35:29.116Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69136629f922b639ab601262
Added to database: 11/11/2025, 4:36:57 PM
Last enriched: 11/18/2025, 5:11:43 PM
Last updated: 11/22/2025, 7:01:10 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumCVE-2025-2609: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in MagnusSolution MagnusBilling
HighCVE-2024-9643: CWE-489 Active Debug Code in Four-Faith F3x36
CriticalCVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.