Can this table be used by a remote attacker to set up MitM attacks?

Topic.

This seems to me to be an easy win, if perhaps I knew precisely how this table operated. I tried one target, replacing the gateway address with my own public ip (deleted the dhcpv4 entry and added a new one, but as you can see I can’t change the origin from static nor can I edit the existing DHCPV4 entry), which resulted in the target going offline, so that didn’t work. But there must be a vector here, yeah?