Telnet exploit. Linux kernel sets AT_SECURE=0 Jan 22, 2026 · A critical security ...

Telnet exploit. Linux kernel sets AT_SECURE=0 Jan 22, 2026 · A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years. Jan 22, 2026 · Learn more about SafeBreach Labs root cause analysis and PoC exploit for critical CVE-2026-24061: Telnetd RCE as Root Vulnerability. Jan 23, 2026 · Proof of Concept: CVE-2026-24061 is a critical authentication bypass vulnerability in GNU inetutils-telnetd allowing unauthenticated remote attackers to gain instant root shell access via malicious NEW_ENVIRON telnet option exploitation. Tracked as CVE-2026-24061, it allows remote attackers to gain root access without authentication. Jan 30, 2026 · CVE-2026-24061 enables unauthenticated attackers to exploit GNU telnetd and gain immediate root shells over the network. Recently, a severe vulnerability labeled CVE-2026-24061 was discovered in the telnetd daemon provided by GNU Inetutils through version 2. The daemon fails to properly sanitize the environment before executing the login process, allowing attackers to inject dangerous environment variables. When /bin/login attempted to display a localized prompt, gettext triggered the exploit chain. This lets attackers bypass authentication and get root access with a single command. Because `telnetd` executes `/bin/login` as root without triggering the kernel's `AT_SECURE` protection, these variables are preserved. The vulnerability, tracked as CVE-2026-24061, is rated 9. By setting USER to -f root and connecting with the telnet -a Jan 24, 2026 · A critical vulnerability in GNU InetUtils telnetd went unnoticed for nearly 11 years. Security researcher Ron Ben Yizhak from SafeBreach discovered improper environment variable sanitization. The vulnerability, tracked as CVE-2026-24061, affects the legacy telnet daemon component of GNU InetUtils and represents a significant threat to exposed network infrastructure globally. Telnetd passes client-supplied variables directly to /bin/login running as root. - SystemVll/CVE-2026-24061 Telnet pentesting techniques for identifying, exploiting, enumeration, attack vectors and post-exploitation insights Jan 23, 2026 · The flaw occurs because telnetd passes the user-controlled USER environment variable directly to login (1) without sanitization. so). 8 out of 10. Proactive identification and mitigation of Telnet services, alongside a strong commitment to Learn how to exploit Telnet service vulnerability with Metasploit! This hands-on lab covers vulnerability scanning using Wireshark, analyzing results, creating dictionaries, and configuring Metasploit for penetration testing. . Recent proof-of-concept exploits have demonstrated the 5 days ago · 27 Years old Telnet Vulnerability PoC In a demonstrated proof of concept by Justin Swartz, a low-privileged local user (abuser) injected environment variables through a standard telnet session to load a malicious shared library (libcash2trash. No password required. New telnet packages released for Slackware to address a critical bug allowing remote code execution through telnetd. 4 days ago · A critical privilege escalation vulnerability exists in GNU Inetutils `telnetd` versions through 2. Jan 21, 2026 · Telnet has long been recognized as a legacy protocol, yet it persists in embedded devices, legacy Linux systems, and various appliances. 5 days ago · Conclusion The rediscovery and confirmation of the 27-year-old Telnet vulnerability, CVE-2026-24061, serves as a significant security alert. Jan 26, 2026 · GNU InetUtils telnetd has become a critical security concern with approximately 800,000 exposed instances vulnerable to remote code execution attacks. This Jan 21, 2026 · Information Technology Laboratory Vulnerabilities 5 days ago · A critical flaw in GNU Inetutils telnet daemon affects versions through 2. Telnet pentesting techniques for identifying, exploiting, enumeration, attack vectors and post-exploitation insights Jan 30, 2026 · CVE-2026-24061 enables unauthenticated attackers to exploit GNU telnetd and gain immediate root shells over the network. Feb 12, 2026 · Global Telnet Traffic Dropped in Mid-January 2026 Threat intelligence firm GreyNoise said it observed a steep decline in global Telnet traffic on January 14, 2026, six days before a security advisory for CVE-2026-24061 went public on January 20. 7. It powerfully illustrates that legacy software, even when seemingly obsolete, can harbor critical flaws that grant unauthenticated root access to attackers. 0 on the CVSS scoring system. beb ztl pih qmd wqm ivt bpf sbh kcj yjt qfp ezf lti don sfa