Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

0
Critical
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

AI-Powered Analysis

AILast updated: 12/25/2025, 18:57:42 UTC

Technical Analysis

The FreeBSD rtsold daemon, responsible for processing IPv6 router advertisements to configure network parameters, contains a critical remote code execution vulnerability in version 15.x. The vulnerability arises from improper handling of the DNSSL (DNS Search List) option within router advertisement messages. An attacker can craft malicious IPv6 router advertisements containing specially crafted DNSSL options that exploit this flaw, leading to arbitrary code execution on the target system without requiring authentication or user interaction. The rtsold daemon runs with elevated privileges, so successful exploitation can result in full system compromise, impacting confidentiality, integrity, and availability. The presence of publicly available Python exploit code (EDB ID 52463) lowers the barrier for attackers to weaponize this vulnerability. Although no active exploitation has been reported, the critical severity and ease of exploitation make this a significant threat. The lack of official patches or mitigations at the time of disclosure necessitates immediate defensive measures. This vulnerability is particularly relevant for environments relying on FreeBSD 15.x for IPv6 network configuration, including ISPs, data centers, and enterprise networks. The attack vector is network-based, requiring the attacker to send malicious IPv6 router advertisements to the target, which may be feasible in local or compromised network segments.

Potential Impact

European organizations using FreeBSD 15.x with rtsold enabled for IPv6 network configuration face a high risk of remote code execution attacks that can lead to full system compromise. This can result in unauthorized access to sensitive data, disruption of network services, and potential lateral movement within corporate networks. Critical infrastructure providers, telecommunications companies, and data centers are particularly vulnerable due to their reliance on robust IPv6 configurations and FreeBSD-based systems. The compromise of such systems could disrupt essential services, cause data breaches, and damage organizational reputation. Additionally, the exploitability without authentication or user interaction increases the likelihood of successful attacks, especially in environments with exposed IPv6 networks or insufficient network segmentation. The absence of patches at disclosure heightens the urgency for proactive mitigation to prevent exploitation and limit potential damage.

Mitigation Recommendations

1. Immediately monitor FreeBSD security advisories and apply official patches once released. 2. Until patches are available, disable the rtsold daemon if IPv6 router advertisement processing is not essential. 3. Implement strict network segmentation and filtering to block unauthorized IPv6 router advertisements, especially from untrusted or external sources. 4. Deploy Intrusion Detection/Prevention Systems (IDS/IPS) capable of detecting anomalous or malformed IPv6 router advertisements targeting DNSSL options. 5. Use firewall rules to restrict access to systems running rtsold, limiting exposure to potentially malicious network traffic. 6. Conduct network traffic analysis to identify suspicious IPv6 router advertisements and respond promptly. 7. Consider deploying endpoint detection and response (EDR) solutions to detect unusual process behavior indicative of exploitation. 8. Educate network administrators about the risks associated with IPv6 router advertisement handling and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52463
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

# Exploit Title: FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
# Date: 2025-12-16
# Exploit Author: Lukas Johannes Möller
# Vendor Homepage: https://www.freebsd.org/
# Version: FreeBSD 13.x, 14.x, 15.x (before 2025-12-16 patches)
# Tested on: FreeBSD 14.1-RELEASE
# CVE: CVE-2025-14558
#
# Description:
#   rtsold(8) processes IPv6 Router Advertisement DNSSL options without
#   validating domain names for shell metacharacters. The decoded domains
#   are passed to resolvconf(8), a shell sc
... (3609 more characters)
Code Length: 4,109 characters

Threat ID: 694d89022ffa995e0c012b37

Added to database: 12/25/2025, 6:57:06 PM

Last enriched: 12/25/2025, 6:57:42 PM

Last updated: 12/26/2025, 10:00:45 AM

Views: 722

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats