PT-2026-3756 · Gnu+2 · Inetutils+2

Carlos Cortes Alvarez

+1

·

Published

2026-01-20

·

Updated

2026-05-08

·

CVE-2026-24061

CVSS v2.0

10

Critical

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions GNU Inetutils versions 1.9.3 through 2.7
Description GNU Inetutils telnetd is vulnerable to a remote authentication bypass. An attacker can exploit this flaw by manipulating the USER environment variable, specifically by setting it to "-f root", to gain unauthorized root access. This vulnerability has been actively exploited and affects systems running telnetd. The flaw has existed for over 11 years and allows attackers to bypass authentication without needing credentials. Approximately 800,000 systems are estimated to be exposed. The vulnerability allows for remote code execution and potential system compromise.
Recommendations Upgrade to GNU Inetutils version 2.8 or later. If upgrading is not possible, disable the telnetd service entirely. Restrict access to telnetd to trusted IP addresses and monitor logs for suspicious activity.

Exploit

Fix

RCE

Argument Injection

Weakness Enumeration

Related Identifiers

BDU:2026-00709
CVE-2026-24061
TELNETDCVE_2026_24061
USN-7992-1
USN-7992-2

Affected Products

Inetutils
Linuxmint
Ubuntu