A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run.
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
| Software | From | Fixed in |
|---|---|---|
| netgear / rs700_firmware | - | 1.0.9.6 |
| netgear / rax54sv2_firmware | - | 1.1.6.36 |
| netgear / rax45v2_firmware | - | 1.1.6.36 |
| netgear / rax41v2_firmware | - | 1.1.6.36 |
| netgear / rax50_firmware | - | 1.2.14.114 |
| netgear / raxe500_firmware | - | 1.2.14.114 |
| netgear / rax41_firmware | - | 1.0.17.142 |
| netgear / rax43_firmware | - | 1.0.17.142 |
| netgear / rax35v2_firmware | - | 1.0.17.142 |
| netgear / raxe450_firmware | - | 1.0.17.142 |
| netgear / rax43v2_firmware | - | 1.1.6.36 |
| netgear / rax42_firmware | - | 1.0.17.142 |
| netgear / rax45_firmware | - | 1.0.17.142 |
| netgear / rax50v2_firmware | - | 1.1.6.36 |
| netgear / mr90_firmware | - | 1.0.2.46 |
| netgear / ms90_firmware | - | 1.0.2.46 |
| netgear / rax42v2_firmware | - | 1.1.6.36 |
| netgear / rax49s_firmware | - | 1.1.6.36 |