CVE-2026-24061 Exposed GNU Inetutils telnetd Servers to Unauthenticated RCE via Argument Injection

Related

New GhostLock Tool Abuses Windows API to Block File Access

What happened A security researcher has published a proof-of-concept tool...

Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks

What happened Ivanti has disclosed a high-severity remote code execution...

Mirai-Based xlabs_v1 Botnet Exploits Android Debug Bridge to Hijack IoT Devices

What happened Hunt.io researchers have identified a new Mirai-derived botnet...

Cisco Releases Fix for DoS Flaw That Requires Manual Reboot to Recover

What happened Cisco has released security updates addressing a high-severity...

Palo Alto Networks Warns of Firewall RCE Zero-Day Exploited in Attacks

What happened Palo Alto Networks has disclosed a critical unpatched...

Share

What happened

The GNU Inetutils telnetd vulnerability exposed large numbers of internet-accessible Telnet servers to unauthenticated remote code execution. The issue, tracked as CVE-2026-24061 (CVSS 9.8), was described as an authentication bypass rooted in argument injection affecting telnetd versions 1.9.3 through 2.7. The flaw occurs because telnetd fails to sanitize the USER environment variable before passing it to /usr/bin/login. An attacker can inject a value such as -f root, causing login to treat the session as a pre-authenticated root login and bypass credential checks. With authentication bypassed, attackers can gain root-level access and execute commands on exposed systems. The report also noted a proof-of-concept had been released and that roughly 800,000 Telnet instances were internet-facing.

Who is affected

Organizations running vulnerable GNU Inetutils telnetd versions with Telnet exposed to the internet are directly affected. Exposure is direct where the service is reachable externally, and potential where Telnet is present internally but accessible from less-trusted network segments.

Why CISOs should care

Unauthenticated RCE on legacy remote access services like Telnet can enable rapid compromise, persistence, and lateral movement—often on embedded, industrial, or infrastructure-adjacent systems that are harder to patch. Large-scale exposure increases the likelihood of opportunistic exploitation and automated scanning.

3 practical actions

  • Eliminate or isolate Telnet services: Disable Telnet where possible, and strictly restrict network access to telnetd services behind VPN and allowlisted management hosts.

  • Patch vulnerable telnetd versions: Upgrade GNU Inetutils telnetd beyond affected releases and verify authentication behavior is restored with regression testing.

  • Hunt for exploitation attempts: Monitor for suspicious telnetd sessions, unexpected root logins, and anomalous login invocation patterns on systems running telnetd.
IMG 0514 2
+ posts

John Kevin Hao is a news and feature writer covering cybersecurity, technology, and business targeted for professional audiences.