RCE via ND6 Router Advertisements in FreeBSD

FreeBSD bug lets nearby networks run code — users split between Starbucks panic and “no IPv6”

TLDR: FreeBSD fixed a flaw that let people on the same network make your machine run commands via IPv6 router messages. Commenters are split between coffee-shop panic, “no one uses IPv6” dismissal, and angry calls to ditch fragile shell scripts — with consensus on one thing: patch now.

FreeBSD dropped a security advisory about a flaw that lets devices on the same network push bad “router tips” and make your machine run commands you never asked for. Translation: if you’re on shared Wi‑Fi and using IPv6 (the newer internet addressing), a sneaky neighbor could make your FreeBSD box do tricks. Patches are out now, per the FreeBSD advisory, but the comments turned into primetime drama.

One camp is pure panic. TekMol waved the latte alarm: if laptops auto‑join familiar names like “Starbucks,” then “every FreeBSD laptop in proximity” could be fair game. Embedded folks chimed in with doom, saying devices running FreeBSD under the hood will have a “hard time” patching fast. Another camp went full shrug: rs_rs_rs_rs_rs argued it’s fine because the attack needs IPv6, and “no one” uses it — cue eye‑rolls from everyone who actually does.

Then came the rage against shell scripts. tuetuopay blasted the “house of cards” that let unquoted input execute commands, with jokes about router jailbreaks and shared‑rack neighbors playing sysadmin roulette. Meme energy peaked with “evil twin latte” riffs and “ACCEPT_RTADV? More like ACCEPT_RCE” quips. Bottom line: it’s the classic internet split — patch now vs. “not my problem” — with extra foam and a side of tech shame.

Key Points

  • CVE-2025-14558 affects rtsol(8)/rtsold(8) due to unvalidated domain search list options in IPv6 ND6 Router Advertisements.
  • Malicious input is passed to resolvconf(8), a shell script lacking proper quoting, enabling remote code execution.
  • Exploitation is limited to the same network segment; Router Advertisement messages are not routable.
  • No workaround exists; systems not using IPv6 or not accepting Router Advertisements are not affected.
  • Fixes are available via freebsd-update(8) binary patches or source patches, with commits across FreeBSD 13, 14, and 15 branches.

Hottest takes

"every FreeBSD laptop in proximity of an attacker is vulnerable, right?" — TekMol
"IPv6 is a prerequisite… it won’t affect anyone." — rs_rs_rs_rs_rs
"Can we be done with the house of cards that are shell scripts everywhere?" — tuetuopay
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.