PT-2026-25339 · Free Software Foundation+2 · Inetutils

Adiel Sol

+6

·

Published

2026-01-01

·

Updated

2026-03-18

·

CVE-2026-32746

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
🚨 Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23
A critical buffer overflow vulnerability in the GNU Inetutils telnetd daemon. Tracked as CVE-2026-32746, this flaw allows an unauthenticated remote attacker to execute arbitrary code and gain root access to affected systems.
The vulnerability requires zero user interaction and possesses a highly trivial exploitation path, prompting an urgent warning for defenders managing legacy infrastructure.
An attacker can trigger the classic buffer overflow by sending a specially crafted message during the initial connection handshake.
#cybersecuritynews #Linux

Exploit

Fix

RCE

Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2026-03114
CVE-2026-32746

Affected Products

Inetutils