{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12942","assignerOrgId":"a2826606-91e7-4eb6-899e-8484bd4575d5","state":"PUBLISHED","assignerShortName":"NETGEAR","dateReserved":"2025-11-10T07:35:26.124Z","datePublished":"2025-11-11T16:17:37.212Z","dateUpdated":"2026-02-26T16:57:57.630Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"R6260","vendor":"NETGEAR","versions":[{"lessThanOrEqual":"1.1.0.86","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"R6850","vendor":"NETGEAR","versions":[{"lessThanOrEqual":"1.1.0.86","status":"affected","version":"0","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:h:netgear:r6260:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.0.86","versionStartIncluding":"0","vulnerable":true}],"negate":false,"operator":"OR"},{"cpeMatch":[{"criteria":"cpe:2.3:h:netgear:r6850:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.0.86","versionStartIncluding":"0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"dcmtruman"}],"datePublic":"2025-11-11T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability in NETGEAR R6260 and NETGEAR R6850 allows unauthenticated attackers connected to LAN with ability to perform MiTM attacks and control over DNS Server to perform command execution.<p>This issue affects R6260: through 1.1.0.86; R6850: through 1.1.0.86.</p>"}],"value":"Improper Input Validation vulnerability in NETGEAR R6260 and NETGEAR R6850 allows unauthenticated attackers connected to LAN with ability to perform MiTM attacks and control over DNS Server to perform command execution.This issue affects R6260: through 1.1.0.86; R6850: through 1.1.0.86."}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"ADJACENT","baseScore":4.8,"baseSeverity":"MEDIUM","exploitMaturity":"UNREPORTED","privilegesRequired":"LOW","providerUrgency":"AMBER","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:L/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a2826606-91e7-4eb6-899e-8484bd4575d5","shortName":"NETGEAR","dateUpdated":"2025-11-11T17:12:06.072Z"},"references":[{"tags":["product","patch"],"url":"https://www.netgear.com/support/product/r6850"},{"tags":["patch","product"],"url":"https://www.netgear.com/support/product/r6260"},{"tags":["vendor-advisory"],"url":"https://kb.netgear.com/000070355/NETGEAR-Security-Advisories-November-2025"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Devices with automatic updates enabled may already have\nthis patch applied. If not, please check the firmware version and update to the\nlatest.</p>\n\n<p>Fixed in:</p>\n\n<p>R6260 <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.downloads.netgear.com/files/GDC/R6260/R6260-V1.1.1.88.zip\">Firmware\nVersion 1.1.0.88 or later</a></p>\n\n<p>R6850 <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.downloads.netgear.com/files/GDC/R6850/R6850_V1.1.0.88.zip\">Firmware\nVersion 1.1.0.88 or later</a></p>\n\n\n\n\n\n<br>"}],"value":"Devices with automatic updates enabled may already have\nthis patch applied. If not, please check the firmware version and update to the\nlatest.\n\n\n\nFixed in:\n\n\n\nR6260 Firmware\nVersion 1.1.0.88 or later\n\n\n\nR6850 Firmware\nVersion 1.1.0.88 or later"}],"source":{"discovery":"EXTERNAL"},"title":"Improper input validation in NETGEAR R6260 and R6850","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-12942","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-11-13T04:55:35.996372Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:57:57.630Z"}}]}}