PT-2026-3756 · Gnu+2 · Inetutils+2
Carlos Cortes Alvarez
+1
·
Published
2026-01-20
·
Updated
2026-03-04
·
CVE-2026-24061
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
GNU Inetutils versions 1.9.3 through 2.7
telnetd versions 0.17+2.5-3ubuntu4.1
Description
A critical vulnerability exists in GNU Inetutils telnetd, allowing remote attackers to bypass authentication and gain root access. This is achieved by manipulating the USER environment variable, specifically by setting it to "-f root". The vulnerability stems from improper handling of this variable during the login process. Active exploitation of this flaw has been observed. Approximately 800,000 systems globally are potentially exposed. The vulnerability has been assigned CVE-2026-24061 and has a CVSS score of 9.8 (Critical). The vulnerability allows an attacker to bypass authentication and gain root access without any credentials.
Recommendations
Upgrade to GNU Inetutils version 2.8 or later.
Disable the telnetd service if it is not required.
Restrict access to the telnetd service to trusted IP addresses.
Monitor logs for anomalous login attempts.
Exploit
Fix
RCE
Argument Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00709
CVE-2026-24061
USN-7992-1
USN-7992-2
Affected Products
Inetutils
Linuxmint
Ubuntu
References · 217
- 🔥 https://github.com/SafeBreach-Labs/CVE-2026-24061⭐ 63 🔗 20 · Exploit
- 🔥 https://labs.greynoise.io/grimoire/2026-01-22-f-around-and-find-out-18-hours-of-unsolicited-houseguests/index.html · Exploit
- 🔥 https://openwall.com/lists/oss-security/2026/01/20/2#:~:text=root@...a%3A~%20USER=\' · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2026-24061 · Security Note
- https://bdu.fstec.ru/vul/2026-00709 · Security Note
- https://osv.dev/vulnerability/DEBIAN-CVE-2026-24061 · Vendor Advisory
- https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html · Vendor Advisory
- https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc · Patch
- https://osv.dev/vulnerability/USN-7992-1 · Vendor Advisory
- https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b · Patch
- https://osv.dev/vulnerability/UBUNTU-CVE-2026-24061 · Vendor Advisory
- https://ubuntu.com/security/CVE-2026-24061 · Vendor Advisory
- https://osv.dev/vulnerability/USN-7992-2 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7992-1 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2026-24061 · Security Note