Dual DHCP DNS Server 8.01 improperly accepts and caches UDP DNS responses without validating that the response originates from a legitimate configured upstream DNS server. The implementation matches responses primarily by TXID and inserts results into the cache, enabling a remote attacker to inject forged responses and poison the DNS cache, potentially redirecting victims to attacker-controlled destinations.
https://sourceforge.net/projects/dhcp-dns-server/
https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-71058