NETGEAR RAX30/RAXE300 Improper Cert Validation in Firmware Update logic
CVE-2025-12943 Published on November 11, 2025

Improper certificate validation in firmware update logic in NETGEAR RAX30 and RAXE300
Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router) allows attackers with the ability to intercept and tamper traffic destined to the device to execute arbitrary commands on the device. Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update to the latest. Fixed in: RAX30 firmware 1.0.14.108 or later. RAXE300 firmware 1.0.9.82 or later

Vendor Advisory NVD

Weakness Type

Improper Certificate Validation

The software does not validate, or incorrectly validates, a certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.


Products Associated with CVE-2025-12943

stack.watch emails you whenever new vulnerabilities are published in Netgear Rax30 or Netgear Raxe300. Just hit a watch button to start following.

 
 

Affected Versions

NETGEAR RAX30: NETGEAR RAXE300:

Exploit Probability

EPSS
0.02%
Percentile
4.08%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.