Metrics
Affected Vendors & Products
No advisories yet.
Solution
NETGEAR strongly advises against allowing untrusted users or devices on your WiFi network. The NETGEAR C6220 has reached End-of-Support (EOS) and C6230 will reach EOS soon. Due to limited security impact (device reboots only), no fixes are planned.
Workaround
The users are advised to not allow untrusted devices to connect to the Wi-fi Network.
Tue, 09 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 09 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 09 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Denial of Service Vulnerability in NETGEAR C6220 and C6230 (DOCSIS® 3.0 Two-in-one Cable Modem + WiFi Router) allows authenticated local WiFi users reboot the router. | |
| Title | Denial of Service Vulnerability in NETGEAR C6220 and C6230 | |
| First Time appeared |
Netgear
Netgear c6220 Netgear c6230 |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:h:netgear:c6220:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:c6230:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Netgear
Netgear c6220 Netgear c6230 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NETGEAR
Published:
Updated: 2025-12-09T20:44:09.127Z
Reserved: 2025-11-10T07:35:22.119Z
Link: CVE-2025-12941
Updated: 2025-12-09T20:22:35.197Z
Status : Awaiting Analysis
Published: 2025-12-09T17:15:48.453
Modified: 2025-12-09T20:15:52.723
Link: CVE-2025-12941
No data.
OpenCVE Enrichment
No data.