@train @electronic_eel Copied from the dnsmasq manpage:
Reject (and log) addresses from upstream nameservers which are in the private ranges. This blocks an attack where a browser behind a firewall is used to probe machines on the local network. For IPv6, the private range covers the IPv4-mapped addresses in private space plus all link-local (LL) and site-local (ULA) addresses.This is the way OpenWrt works by default.@train @tuhgy difficult to say. The attack vector is well known for years, the required infra & code not very difficult. so someone pulling this off is not unreasonable. You just need a widespread kind of vulnerable device on common local IPs that makes mass attacks pay off. But I haven't seen actual attacks or heard of them.
So I think setting up protection against it is a good idea, also because it is easily done on many router platforms.