Impact
Pi‑hole FTL provides an interactive API that is intended to be read‑only for sessions created with a CLI password. The flaw allows those sessions to import Teleporter archives through the /api/teleporter endpoint, which can overwrite configuration settings. This results in unauthorized modifications of DNS and filtering options, potentially disrupting service or redirecting traffic.
Affected Systems
The affected product is Pi‑hole FTL versions 6.0 through 6.5 inclusive. Systems running those versions are vulnerable until updated to 6.6 or later.
Risk and Exploitability
The CVSS score of 6.1 indicates medium severity. EPSS information is not available and the issue is not listed in CISA's KEV catalog. Based on the description, the low effort required relies on possessing a CLI password; after gaining a CLI‑scoped session the attacker can call /api/teleporter with a malicious Teleporter archive to rewrite configuration. The vulnerability is fixed in version 6.6, so upgrading removes the risk.
OpenCVE Enrichment