CVE-2026-42511 PUBLISHED

Remote code execution via malicious DHCP options

Assigner: freebsd
Reserved: 28.04.2026 Published: 30.04.2026 Updated: 30.04.2026

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it.

A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

Product Status

Vendor FreeBSD
Product FreeBSD
Versions Default: unknown
  • affected from 15.0-RELEASE to p7 (excl.)
  • affected from 14.4-RELEASE to p3 (excl.)
  • affected from 14.3-RELEASE to p12 (excl.)
  • affected from 13.5-RELEASE to p13 (excl.)

Credits

  • Joshua Rogers of AISLE Research Team finder

References

Problem Types

  • CWE-149: Improper Neutralization of Quoting Syntax CWE