Description
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DHCP lease time configuration parameter (dhcp.leaseTime). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.
Published: 2026-04-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

PI‑hole FTL (pihole‑FTL) includes a remote code execution vulnerability that arises when the DHCP lease time setting, dhcp.leaseTime, accepts newline characters that are then interpreted as dnsmasq configuration directives. By exploiting this flaw, an attacker who is authenticated and has the ability to modify the lease time can inject arbitrary commands that execute on the host operating system, leading to full system compromise. The weakness stems from improper handling of newline characters in configuration input, corresponding to CWE‑78 and CWE‑93. The vulnerability is present in FTL releases from version 6.0 up to, but not including, version 6.6.

Affected Systems

The affected product is PI‑hole FTL, the DNS forwarding and blocking engine used by the Pi‑hole network advertising platform. Anyone running PI‑hole FTL versions 6.0 through 6.5, inclusive, is potentially vulnerable. The vulnerability is fixed in release 6.6, so any installation of that version or later is immune.

Risk and Exploitability

The CVSS score for this issue is 8.8, indicating high severity. Because the exploit requires authenticated access to modify DHCP settings or the API, the attacker's success depends on prior compromise or privileged access to the PI‑hole management interface. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting that large‑scale, publicly known exploitation has not yet been documented. Nonetheless, the potential for catastrophic system compromise warrants serious attention and prompt remediation.

Generated by OpenCVE AI on April 7, 2026 at 22:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PI‑hole to version 6.6 or later to eliminate the vulnerability
  • If an upgrade is not immediately possible, restrict or disable the DHCP server feature so that dhcp.leaseTime cannot be altered
  • Limit authenticated API and web interface access to trusted administrators only to reduce the attack surface

Generated by OpenCVE AI on April 7, 2026 at 22:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pi-hole:ftldns:*:*:*:*:*:*:*:*

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Pi-hole
Pi-hole ftldns
Vendors & Products Pi-hole
Pi-hole ftldns

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DHCP lease time configuration parameter (dhcp.leaseTime). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.
Title Pi-hole FTL affected by Remote Code Execution (RCE) via dhcp.leaseTime Newline Injection
Weaknesses CWE-78
CWE-93
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T14:35:45.884Z

Reserved: 2026-04-03T02:15:39.280Z

Link: CVE-2026-35520

cve-icon Vulnrichment

Updated: 2026-04-09T14:35:35.567Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T16:16:28.550

Modified: 2026-04-28T20:28:50.803

Link: CVE-2026-35520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:24:14Z

Weaknesses