CVE-2026-24061 Exposed GNU Inetutils telnetd Servers to Unauthenticated RCE via Argument Injection

Related

Apache Syncope Vulnerability Lets Attackers Hijack User Sessions

What happened A critical XML External Entity (XXE) vulnerability in...

Malicious App on Google Play With 50K+ Downloads Steals Credentials and Pushes Ads

What happened Zscaler ThreatLabz identified a malicious Android app hosted...

Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution

What happened A high-severity vulnerability in Hikvision wireless access points...

Share

What happened

The GNU Inetutils telnetd vulnerability exposed large numbers of internet-accessible Telnet servers to unauthenticated remote code execution. The issue, tracked as CVE-2026-24061 (CVSS 9.8), was described as an authentication bypass rooted in argument injection affecting telnetd versions 1.9.3 through 2.7. The flaw occurs because telnetd fails to sanitize the USER environment variable before passing it to /usr/bin/login. An attacker can inject a value such as -f root, causing login to treat the session as a pre-authenticated root login and bypass credential checks. With authentication bypassed, attackers can gain root-level access and execute commands on exposed systems. The report also noted a proof-of-concept had been released and that roughly 800,000 Telnet instances were internet-facing.

Who is affected

Organizations running vulnerable GNU Inetutils telnetd versions with Telnet exposed to the internet are directly affected. Exposure is direct where the service is reachable externally, and potential where Telnet is present internally but accessible from less-trusted network segments.

Why CISOs should care

Unauthenticated RCE on legacy remote access services like Telnet can enable rapid compromise, persistence, and lateral movement—often on embedded, industrial, or infrastructure-adjacent systems that are harder to patch. Large-scale exposure increases the likelihood of opportunistic exploitation and automated scanning.

3 practical actions

  • Eliminate or isolate Telnet services: Disable Telnet where possible, and strictly restrict network access to telnetd services behind VPN and allowlisted management hosts.

  • Patch vulnerable telnetd versions: Upgrade GNU Inetutils telnetd beyond affected releases and verify authentication behavior is restored with regression testing.

  • Hunt for exploitation attempts: Monitor for suspicious telnetd sessions, unexpected root logins, and anomalous login invocation patterns on systems running telnetd.