PT-2026-3756 · Gnu+2 · Inetutils+2
Carlos Cortes Alvarez
+1
·
Published
2026-01-20
·
Updated
2026-05-08
·
CVE-2026-24061
CVSS v2.0
10
Critical
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
GNU Inetutils versions 1.9.3 through 2.7
Description
GNU Inetutils telnetd is vulnerable to a remote authentication bypass. An attacker can exploit this flaw by manipulating the USER environment variable, specifically by setting it to "-f root", to gain unauthorized root access. This vulnerability has been actively exploited and affects systems running telnetd. The flaw has existed for over 11 years and allows attackers to bypass authentication without needing credentials. Approximately 800,000 systems are estimated to be exposed. The vulnerability allows for remote code execution and potential system compromise.
Recommendations
Upgrade to GNU Inetutils version 2.8 or later. If upgrading is not possible, disable the telnetd service entirely. Restrict access to telnetd to trusted IP addresses and monitor logs for suspicious activity.
Exploit
Fix
RCE
Argument Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Inetutils
Linuxmint
Ubuntu