CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass
dev.to·5h·
Discuss: DEV
Preview
Report Post

Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

Vulnerability ID: CVE-2026-24061 CVSS Score: 9.8 Published: 2026-01-21

A critical argument injection vulnerability in GNU Inetutils telnetd allows unauthenticated remote attackers to gain full root access by manipulating the USER environment variable.

TL;DR

It is 2026, and we are still getting root shells via Telnet. By setting the ‘USER’ environment variable to ‘-f root’ during the initial handshake, an attacker can trick the remote telnet daemon into executing the system ‘login’ binary with the ‘-f’ (force) flag. This bypasses authentication entirely, dropping the attacker into a root shell. If you are running GNU Inetutils telnetd (1.9.3 to 2.7), you are vulnerable.


⚠️ Exploit…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help