FreeBSD rtsold DNSSL Command Injection (RCE)
rtsold(8) does not validate DNSSL domain names for shell metacharacters before passing them to resolvconf(8). Command substitution via $() enables remote code execution from an adjacent network.
Affected: FreeBSD 13.x, 14.x, 15.x before 2025-12-16
sudo python3 exploit.py -i eth0 # touch /tmp/pwned
sudo python3 exploit.py -i eth0 -p 'id > /tmp/out' # custom command- Layer 2 adjacency to target
- Target:
rtsoldwithACCEPT_RTADVenabled - Attacker: root, Python 3, Scapy
- https://security.FreeBSD.org/advisories/FreeBSD-SA-25:12.rtsold.asc
- https://www.exploit-db.com/exploits/52463
Credits: Kevin Day