Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12946: CWE-20 Improper Input Validation in NETGEAR RS700

0
Medium
VulnerabilityCVE-2025-12946cvecve-2025-12946cwe-20
Published: Tue Dec 09 2025 (12/09/2025, 17:02:20 UTC)
Source: CVE Database V5
Vendor/Project: NETGEAR
Product: RS700

Description

A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.

AI-Powered Analysis

AILast updated: 12/16/2025, 18:53:17 UTC

Technical Analysis

CVE-2025-12946 is a vulnerability classified under CWE-20 (Improper Input Validation) found in the speedtest feature of multiple NETGEAR Nighthawk routers, including the RS700 and several RAX series models. The root cause is insufficient validation of input data during the speedtest operation, which can be exploited by attackers on the WAN side who perform man-in-the-middle (MiTM) attacks to intercept and manipulate DNS responses. By altering these DNS responses, the attacker can inject malicious commands that the router executes when the speedtest is initiated. This leads to remote command execution without requiring authentication but does require user interaction to trigger the speedtest. The vulnerability affects firmware versions prior to specified updates across many models, indicating a broad attack surface. The CVSS 4.4 score reflects moderate severity, considering the attack vector is over the network with high attack complexity and partial user interaction. The vulnerability impacts confidentiality, integrity, and availability of the affected devices, as attackers could execute arbitrary commands, potentially disrupting network operations or gaining further access. No public exploits have been reported yet, but the risk remains significant due to the widespread use of these routers in both consumer and enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a risk to network infrastructure stability and security, especially for those relying on NETGEAR Nighthawk routers in office or remote environments. Successful exploitation could allow attackers to execute arbitrary commands on routers, leading to potential network disruption, interception of sensitive data, or pivoting to internal networks. This could impact confidentiality by exposing internal network information, integrity by altering router configurations or traffic, and availability by causing denial of service. Organizations with remote or branch offices using these devices are particularly vulnerable, as WAN-side exploitation is possible. The requirement for user interaction (running the speedtest) slightly reduces risk but does not eliminate it, especially in automated or scheduled testing environments. The medium severity rating suggests that while the threat is not critical, it should not be ignored, particularly in sectors with high security requirements such as finance, healthcare, and government.

Mitigation Recommendations

1. Immediately update all affected NETGEAR Nighthawk routers to the latest firmware versions provided by NETGEAR that address CVE-2025-12946. 2. Disable the speedtest feature if it is not essential to reduce the attack surface. 3. Implement network segmentation to isolate routers from critical internal networks, limiting potential lateral movement if compromised. 4. Employ DNS security measures such as DNSSEC and use trusted DNS resolvers to reduce the risk of DNS manipulation via MiTM attacks. 5. Monitor network traffic for unusual DNS responses or unexpected command execution patterns on routers. 6. Educate users and administrators about the risks of running speedtests from untrusted networks or environments. 7. Use VPNs or secure tunnels for remote access to reduce exposure of WAN interfaces to potential attackers. 8. Regularly audit router configurations and logs for signs of compromise or unauthorized changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NETGEAR
Date Reserved
2025-11-10T08:26:32.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693859487515e08d31691a29

Added to database: 12/9/2025, 5:15:52 PM

Last enriched: 12/16/2025, 6:53:17 PM

Last updated: 2/7/2026, 2:01:34 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats