Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

0
Critical
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

AI-Powered Analysis

AILast updated: 01/17/2026, 08:04:09 UTC

Technical Analysis

The vulnerability targets the rtsold daemon in FreeBSD 15.x, which is responsible for router solicitation and managing IPv6 router advertisements. Specifically, the flaw is triggered via the DNSSL (DNS Search List) option processing, where malformed or maliciously crafted DNSSL data can lead to remote code execution. This occurs because rtsold improperly handles or parses the DNSSL option, allowing an attacker to inject and execute arbitrary code on the affected system without requiring authentication or user interaction. The exploit leverages network-level access, typically requiring the attacker to be on the same local network or able to send packets to the vulnerable host. The availability of a Python-based exploit script lowers the barrier for attackers to weaponize this vulnerability. Although no patches have been released yet, the critical nature of this flaw demands immediate attention. The vulnerability impacts the confidentiality, integrity, and availability of affected systems, potentially allowing attackers to take full control, disrupt services, or pivot within networks.

Potential Impact

For European organizations, the impact is significant, especially for those using FreeBSD 15.x in network infrastructure, embedded devices, or critical systems. Successful exploitation can lead to full system compromise, data breaches, service disruption, and lateral movement within corporate networks. This can affect sectors such as telecommunications, government, finance, and critical infrastructure operators who rely on FreeBSD for stability and security. The lack of authentication and ease of exploitation increase the risk of widespread attacks once exploit code becomes widely used. Additionally, the potential for remote code execution can facilitate ransomware deployment or espionage activities, posing severe operational and reputational risks.

Mitigation Recommendations

Since no official patches are currently available, organizations should immediately implement network-level mitigations such as filtering or blocking unsolicited IPv6 router solicitation packets from untrusted sources. Disable or restrict the use of rtsold where feasible, especially on systems exposed to untrusted networks. Employ network segmentation to limit exposure of vulnerable FreeBSD hosts. Monitor network traffic for suspicious DNSSL option packets and anomalous rtsold activity. Consider deploying intrusion detection/prevention systems with custom signatures targeting this exploit. Maintain up-to-date backups and prepare incident response plans for potential exploitation. Stay alert for official patches or advisories from FreeBSD and apply them promptly once released. Engage with FreeBSD community channels for updates and mitigation guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Edb Id
52463
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

# Exploit Title: FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
# Date: 2025-12-16
# Exploit Author: Lukas Johannes Möller
# Vendor Homepage: https://www.freebsd.org/
# Version: FreeBSD 13.x, 14.x, 15.x (before 2025-12-16 patches)
# Tested on: FreeBSD 14.1-RELEASE
# CVE: CVE-2025-14558
#
# Description:
#   rtsold(8) processes IPv6 Router Advertisement DNSSL options without
#   validating domain names for shell metacharacters. The decoded domains
#   are passed to resolvconf(8), a shell sc
... (3609 more characters)
Code Length: 4,109 characters

Threat ID: 694d89022ffa995e0c012b37

Added to database: 12/25/2025, 6:57:06 PM

Last enriched: 1/17/2026, 8:04:09 AM

Last updated: 2/7/2026, 5:36:24 AM

Views: 952

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats