Yes, I don't believe you could cause any harm by DMZ-ing to your own modem. So what you'll basically be doing is use the router as a MIM, but it is all still in your internal network. One concern is that this will create a lot of routing, increase latency etc., but it shouldn't happen on a small setup. As far as security is concerned, even if the hacker does manage to get to the modem shell, he could only access the router, which means he would have to hack in twice to reach your system, thus actually increasing security.
As far as DNS is concerned, if the hacker changes the server to a malicious one, you would get invalid certificate warnings if they tried to phish your requests while you are using SSL. One last thing you can do is to enable logging (though these are generally wiped away when you restart the router for most)
Also, turning off remote management (from WAN) completely in your modem would help a lot. The simplest way sometimes is to simply change all ports to obscure ones. e.g. change your router's telnet port from 23 to 10023. No one generally has enough resources to scan all ports unless they are specifically targetting you.