Thats where some issues come into play.
See ssl is backed by certificates that are cryptographically signed by one or more certificate authorities. Theres nothing stopping you from making a certificate for facebook.com google.com or whatever site you want, but youd only be able to sign it yourself. Since you are not a 'trusted' certificate authority by the browser it will throw a huge warning to the user. Lots of people ignore the warning and proceed anyways cause 'omg I need this email nao!' but it is far from stealthy. Thats where attacks like sslstrip come into play, where you try to downgrade the connection to http only, but a savvy user will notice that his connection suddenly isn't https anymore and may start to wonder why. Still far more subtle than a blaring warning page to the user. Some less popular sites, companies, and colleges will actually use a self-signed certificate(esp for internal or semi-internal sites/portals) and these are ones you can get away with using your own certificate easily as after all legitimate users are used to the warning page presented by the browser anyways. Especially nasty with custom web portals, for example I know college in my state that has free wifi for students but uses a custom web portal that authenticates using their college domain credentials. This means it would be trivial to snarf up some domain credentials to use as a foothold on the college internal network. I was not surprised in the latest when they later announced that the student services store had been compromised(and while I had a good laugh at the incident, no it was not me lol).
In the case of non-browser applications sometimes you run into vulnerabilities where the application fails to check for the validity of the certificate at all, silently accepting whatever it's given to. This vuln has been cropping up more and more in smartphone apps, effectively rendering their use of ssl useless such as with the recent Yik-Yak flaw.
edit: also the above all holds true even if you manipulate the router's dns configuration. As this attack vector and vulnerabilities don't have anything to do with dns itself, but rather implementation flaws with ssl(which are too numerous to list here, but this is some of the more practical applications to take away with).