{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "fixed": "1.0.14.108"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "fixed": "1.0.9.82"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "Improper certificate\nvalidation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream\nAX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band\nWiFi 6E Router) allows attackers with the ability to intercept and\ntamper traffic destined to the device to execute arbitrary commands on the\ndevice.\n\nDevices\nwith automatic updates enabled may already have this patch applied. If not,\nplease check the firmware version and update to the\nlatest.\n\n\n\nFixed in:\n\n\n\nRAX30 firmware\n1.0.14.108 or later.\n\n\n\nRAXE300 firmware\n1.0.9.82 or later",
  "id": "CVE-2025-12943",
  "modified": "2026-03-14T13:45:45.539127954Z",
  "published": "2025-11-11T17:15:39.410Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://www.netgear.com/support/product/rax30"
    },
    {
      "type": "WEB",
      "url": "https://www.netgear.com/support/product/raxe300"
    },
    {
      "type": "ADVISORY",
      "url": "https://kb.netgear.com/000070355/NETGEAR-Security-Advisories-November-2025"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}