Add Module and Documentation for CVE-2025-14558 #20798
Open
+349
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New Module: FreeBSD rtsold/rtsol DNSSL Command Injection (CVE-2025-14558)
Fixes #20789
This PR adds a new exploit module for CVE-2025-14558, a command injection vulnerability in FreeBSD's
rtsol(8)andrtsold(8)daemons. The vulnerability arises from improper validation of the Domain Name Search List (DNSSL) option in IPv6 Router Advertisement (RA) messages, which are passed to theresolvconf(8)script without sanitization. An attacker on the local network can execute arbitrary commands as root by injecting shell metacharacters into the DNSSL domain field.Verification
msfconsoleuse exploit/freebsd/misc/rtsold_dnssl_cmdinjectset INTERFACE <your_interface>(e.g., eth0)set CMD touch /tmp/pwnedexploitRouter Advertisement(s) sent successfullyis displayed./tmp/pwnedexists.Demo / Proof of Concept
This module requires a FreeBSD target system (versions 13.x, 14.x, or 15.0 prior to 2025-12-16 patches) running
rtsoldwith the-sflag.