Description
Dual DHCP DNS Server 8.01 improperly accepts and caches UDP DNS responses without validating that the response originates from a legitimate configured upstream DNS server. The implementation matches responses primarily by TXID and inserts results into the cache, enabling a remote attacker to inject forged responses and poison the DNS cache, potentially redirecting victims to attacker-controlled destinations.
References
sourceforge.net/projects/dhcp-dns-server/
github.com/...ace/Security-Advisory/tree/main/CVE-2025-71058
github.com/...curity-Advisory/blob/main/CVE-2025-71058/poc.c