Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Critical Weaver E-cology RCE Actively Exploited Vulnerability Attacks
May 5, 2026
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
Home/CyberSecurity News/Open Source Firewall OPNsense 25.7.11 Released With Host Discovery
CyberSecurity News

Open Source Firewall OPNsense 25.7.11 Released With Host Discovery

OPNsense, the popular open-source firewall and routing platform built on FreeBSD, released version 25.7.11 on January 15, 2026. This update introduces significant improvements, notably a new host...

David kimber
David kimber
January 20, 2026 3 Min Read
0 0

OPNsense, the popular open-source firewall and routing platform built on FreeBSD, released version 25.7.11 on January 15, 2026. This update introduces significant improvements, notably a new host discovery service designed to enhance network management capabilities.

The release marks an essential incremental update that strengthens both IPv4 and IPv6 functionality while preparing infrastructure for the upcoming major version 26.1.

Host Discovery Service: Core Enhancement

The highlight of this release is the introduction of a host discovery service powered by the hostwatch component (version 1.0.4), now enabled by default across all installations.

This service automatically maintains a dynamic registry of MAC addresses for IPv4 and IPv6 hosts connected to the firewall’s network segments.

The implementation seamlessly integrates with existing OPNsense features, providing host data directly to MAC-type firewall aliases and captive portal clients without requiring manual configuration.

Feature Description / Benefit
Host Discovery Service Automatic MAC tracking for IPv4/IPv6; better visibility and firewall control
MAC-Type Firewall Aliases Device-based firewall rules instead of static IPs
Captive Portal Integration Improved client identification and authentication
IPv6 Prefix Fixes Accurate prefix lifetimes; fewer IPv6 errors
rtsold Enhancement Prevents IPv6 script execution failures
IPv6 Divert Handling More accurate IPv6 traffic filtering
exec() Removal Reduced command-injection attack surface
IDS Improvements Easier rule management and alert tuning
ISC-DHCP Safeguards Safer DHCPv6 transition to Kea
Backend Hardening Fewer injection risks in network services
Hostwatch Update Cleaner logs and better telemetry
DNS SAN Generation Automated certificate SAN management

This functionality solves a longstanding challenge in network administration: maintaining accurate device-to-MAC mappings in complex environments where devices frequently connect and disconnect.

Organizations can now implement more granular firewall policies based on device identity rather than relying solely on static IP configurations.

The service maintains backward compatibility, allowing administrators to opt out through the automatic discovery settings if preferred.

Developers invested substantial effort in IPv6 protocol improvements during the holiday period, addressing multiple protocol-level issues identified by users across diverse network deployments.

Notable kernel fixes include correcting address prefix lifetime calculations, eliminating off-by-one errors in prefix lifetime (pltime) and valid lifetime (vltime) expiration checks, and improving DHCPv6 prefix handling.

The rtsold daemon now properly validates Router Advertisement (RA) lifetimes before triggering configuration scripts, preventing edge-case failures in complex IPv6 environments.

Additionally, IPv6 divert packet handling received corrections at the pf level, improving packet filtering accuracy for organizations running advanced traffic manipulation policies.

The update ensures that hosts with prefix lengths of 128 no longer trigger erroneous warnings during address deletion operations.

The release continues the multi-version effort to eliminate direct exec() function calls across the codebase, a security-focused refactoring that reduces command-injection attack surfaces.

Changes span authentication scripts, system configuration utilities, and backend service management.

The intrusion detection system received updates to refine alert selection mechanisms and to provide a more helpful hint for rule editing.

ISC-DHCP integration received additional safeguards for DHCPv6 property access, a critical step as OPNsense transitions to replacing ISC-DHCP with Kea in version 26.1.

Two hotfixes followed the initial release. Version 25.7.11_1 corrected a vsprintf() parsing vulnerability involving stray percentage characters.

Version 25.7.11_2 addressed edge-case tunable reset logic and suppressed excessive hostwatch logging messages that generated unnecessary system log bloat.

The stable release cycle remains on schedule, with version 26.1-RC1 expected early in the week following release and the final version targeting January 28, 2026.

The upgrade maintains stability for production deployments while positioning organizations for the significant architectural changes arriving in the next major version.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

TP-Link Flaw: Authentication Bypass Via Password Vulnerability Allows

Next Post

Raaga Data Breach Exposes 10.2 Million User Records

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Cerberus Stalkerware Abuses Google Play for Leverages Accessibility
May 5, 2026
Education Sector Under Attack: Espionage & Phishing
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us