This issue affects R7000P: through 1.3.3.154.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
NETGEAR R7000P has reached End-of-Support phase, and no security updates are planned. NETGEAR strongly recommends that you retire this device and upgrade to a newer NETGEAR device for continued security support.
Workaround
NETGEAR strongly recommends not to allow untrusted users to administer your device and protect it with strong password.
Tue, 09 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 09 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 09 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in NETGEAR Nighthawk R7000P routers lets an authenticated admin execute OS command injections due to improper input validation. This issue affects R7000P: through 1.3.3.154. | |
| Title | Improper input validation in NETGEAR Nighthawk router R7000P | |
| First Time appeared |
Netgear
Netgear r7000p |
|
| Weaknesses | CWE-20 | |
| CPEs | cpe:2.3:h:netgear:r7000p:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Netgear
Netgear r7000p |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NETGEAR
Published:
Updated: 2025-12-09T20:44:03.610Z
Reserved: 2025-11-10T08:26:25.516Z
Link: CVE-2025-12945
Updated: 2025-12-09T20:22:24.868Z
Status : Awaiting Analysis
Published: 2025-12-09T17:15:48.647
Modified: 2025-12-09T20:15:53.287
Link: CVE-2025-12945
No data.
OpenCVE Enrichment
No data.