CVE-2025-12946
中文标题:
(暂无数据)
英文标题:
Improper input validation in NETGEAR Nighthawk routers
漏洞描述
中文描述:
(暂无数据)
英文描述:
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| NETGEAR | RS700 | - | ≤ 1.0.7.82 | - |
cpe:2.3:a:netgear:rs700:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX54Sv2 | - | < V1.1.6.36 | - |
cpe:2.3:a:netgear:rax54sv2:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX41v2 | - | < V1.1.6.36 | - |
cpe:2.3:a:netgear:rax41v2:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX50 | - | < V1.2.14.114 | - |
cpe:2.3:a:netgear:rax50:*:*:*:*:*:*:*:*
|
| NETGEAR | RAXE500 | - | < V1.2.14.114 | - |
cpe:2.3:a:netgear:raxe500:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX41 | - | < V1.0.17.142 | - |
cpe:2.3:a:netgear:rax41:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX43 | - | < V1.0.17.142 | - |
cpe:2.3:a:netgear:rax43:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX35v2 | - | < V1.0.17.142 | - |
cpe:2.3:a:netgear:rax35v2:*:*:*:*:*:*:*:*
|
| NETGEAR | RAXE450 | - | < V1.2.14.114 | - |
cpe:2.3:a:netgear:raxe450:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX43v2 | - | < V1.1.6.36 | - |
cpe:2.3:a:netgear:rax43v2:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX42 | - | < V1.0.17.142 | - |
cpe:2.3:a:netgear:rax42:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX45 | - | < V1.0.17.142 | - |
cpe:2.3:a:netgear:rax45:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX50v2 | - | < V1.1.6.36 | - |
cpe:2.3:a:netgear:rax50v2:*:*:*:*:*:*:*:*
|
| NETGEAR | MR90 | - | < V1.0.2.46 | - |
cpe:2.3:a:netgear:mr90:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX42v2 | - | < V1.1.6.36 | - |
cpe:2.3:a:netgear:rax42v2:*:*:*:*:*:*:*:*
|
| NETGEAR | RAX49S | - | < V1.1.6.36 | - |
cpe:2.3:a:netgear:rax49s:*:*:*:*:*:*:*:*
|
| NETGEAR | MS90 | - | < V1.0.2.46 | - |
cpe:2.3:a:netgear:ms90:*:*:*:*:*:*:*:*
|
| netgear | rs700_firmware | * | - | - |
cpe:2.3:o:netgear:rs700_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax54sv2_firmware | * | - | - |
cpe:2.3:o:netgear:rax54sv2_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax45v2_firmware | * | - | - |
cpe:2.3:o:netgear:rax45v2_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax41v2_firmware | * | - | - |
cpe:2.3:o:netgear:rax41v2_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax50_firmware | * | - | - |
cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*
|
| netgear | raxe500_firmware | * | - | - |
cpe:2.3:o:netgear:raxe500_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax41_firmware | * | - | - |
cpe:2.3:o:netgear:rax41_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax43_firmware | * | - | - |
cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax35v2_firmware | * | - | - |
cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:*
|
| netgear | raxe450_firmware | * | - | - |
cpe:2.3:o:netgear:raxe450_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax43v2_firmware | * | - | - |
cpe:2.3:o:netgear:rax43v2_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax42_firmware | * | - | - |
cpe:2.3:o:netgear:rax42_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax45_firmware | * | - | - |
cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax50v2_firmware | * | - | - |
cpe:2.3:o:netgear:rax50v2_firmware:*:*:*:*:*:*:*:*
|
| netgear | mr90_firmware | * | - | - |
cpe:2.3:o:netgear:mr90_firmware:*:*:*:*:*:*:*:*
|
| netgear | ms90_firmware | * | - | - |
cpe:2.3:o:netgear:ms90_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax42v2_firmware | * | - | - |
cpe:2.3:o:netgear:rax42v2_firmware:*:*:*:*:*:*:*:*
|
| netgear | rax49s_firmware | * | - | - |
cpe:2.3:o:netgear:rax49s_firmware:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
4.0 (cna)
MEDIUMCVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/S:N/AU:N/R:A/V:D/RE:M/U:Amber
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-12946 |
2025-12-11 03:30:17 | 2026-01-12 02:10:48 |
| NVD | nvd_CVE-2025-12946 |
2025-12-10 04:21:18 | 2026-01-12 02:27:27 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 17 -> 35
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']