A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
https://www.netgear.com/support/product/rs700
https://www.netgear.com/support/product/raxe500
https://www.netgear.com/support/product/raxe450
https://www.netgear.com/support/product/rax54sv2
https://www.netgear.com/support/product/rax50v2
https://www.netgear.com/support/product/rax49s
https://www.netgear.com/support/product/rax45
https://www.netgear.com/support/product/rax43v2
https://www.netgear.com/support/product/rax43
https://www.netgear.com/support/product/rax42v2
https://www.netgear.com/support/product/rax42
https://www.netgear.com/support/product/rax41v2
https://www.netgear.com/support/product/rax41
https://www.netgear.com/support/product/rax35v2
https://www.netgear.com/support/product/ms90
https://www.netgear.com/support/product/mr90
https://www.netgear.com/support/product/RAX50
https://kb.netgear.com/000070416/December-2025-NETGEAR-Security-Advisory
Published: 2025-12-09
Updated: 2026-01-21
Base Score: 6.8
Vector: CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 7.3
Vector: CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00065