PT-2026-25339 · Free Software Foundation+2 · Inetutils
Adiel Sol
+6
·
Published
2026-01-01
·
Updated
2026-03-18
·
CVE-2026-32746
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
🚨 Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23
Source: https://t.co/HZxmM0a7jn
A critical buffer overflow vulnerability in the GNU Inetutils telnetd daemon. Tracked as CVE-2026-32746, this flaw allows an unauthenticated remote attacker to execute arbitrary code and gain root access to affected systems.
The vulnerability requires zero user interaction and possesses a highly trivial exploitation path, prompting an urgent warning for defenders managing legacy infrastructure.
An attacker can trigger the classic buffer overflow by sending a specially crafted message during the initial connection handshake.
#cybersecuritynews #Linux
Exploit
Fix
RCE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Inetutils