Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Critical Unpatched Telnetd Flaw Enables Unauthenticated Root Remote Code Execution



A critical unpatched Telnetd flaw enables unauthenticated root remote code execution. This vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 and can be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges.

  • The GNU InetUtils telnet daemon (telnetd) has a critical security flaw impacting its stability.
  • The vulnerability, CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0 and allows arbitrary code execution with elevated privileges.
  • The vulnerability can be exploited by an unauthenticated remote attacker to execute malicious code without knowing the password or having a valid login credential.
  • The vulnerability arises from a buffer overflow in the LINEMODE Set Local Characters (SLC) suboption handler, which can result in complete system compromise if telnetd runs with root privileges.
  • To mitigate this vulnerability, it is recommended to disable the service, run telnetd without root privileges, block port 23, and isolate Telnet access.



  • The cybersecurity world has been shaken by a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd). According to Israeli cybersecurity company Dream, which discovered and reported the flaw on March 11, 2026, the vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. This is considered one of the most severe security vulnerabilities in recent times.

    Telnetd is an open-source software that allows remote access to Linux systems via telnet protocol. The vulnerability, which affects all versions of the Telnet service implementation through version 2.7, can be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges. This means that even without knowing the password or having a valid login credential, an attacker can gain control over the system.

    The vulnerability arises from a buffer overflow in the LINEMODE Set Local Characters (SLC) suboption handler. When a specially crafted message is sent during the initial connection handshake before any login prompt appears, it triggers the vulnerability. This allows the attacker to execute arbitrary code as root, which can result in complete system compromise if telnetd runs with root privileges.

    The attacker can exploit this vulnerability by connecting to port 23 and sending a crafted SLC suboption with many triplets. No login is required; the bug is hit during option negotiation, before the login prompt. This means that an unauthenticated attacker can trigger it and turn it into arbitrary writes, which ultimately lead to remote code execution.

    The impact of this vulnerability is significant as successful exploitation could result in remote code execution with full control over the system. An attacker could use this to deploy persistent backdoors, exfiltrate data, or move laterally using compromised hosts as pivot points. Given that telnetd usually runs under root privileges (e.g., under inetd or xinetd), a successful exploit would give the attacker elevated privileges.

    In order to mitigate this vulnerability, it is recommended to disable the service if not necessary, run telnetd without root privileges where required, block port 23 at the network perimeter and host-based firewall level to restrict access, and isolate Telnet access. This will prevent an attacker from exploiting the vulnerability and gaining control over the system.

    The disclosure of this critical security flaw comes nearly two months after another critical security flaw was disclosed in GNU InetUtils telnetd (CVE-2026-24061, CVSS score: 9.8) that could be leveraged to gain root access to a target system. This highlights the importance of staying up-to-date with the latest security patches and keeping software systems secure.

    As cybersecurity threats continue to evolve, it is crucial for organizations to stay vigilant and proactive in addressing potential vulnerabilities. Regularly reviewing system logs, monitoring network traffic, and implementing robust security measures can help prevent such critical security flaws from being exploited.

    In light of this new vulnerability, cybersecurity experts are urging organizations to take immediate action to patch their systems. With the rapid pace of technological advancements comes a corresponding increase in cybersecurity threats. It is essential for organizations to stay informed about the latest security patches and best practices to protect against these evolving threats.

    Moreover, it is crucial for individuals and organizations to develop a proactive approach towards cybersecurity by staying informed about the latest vulnerabilities and taking necessary steps to address them. By doing so, we can minimize the risk of falling victim to such critical security flaws and ensure a safer digital environment.

    In conclusion, the newly disclosed vulnerability in GNU InetUtils telnetd highlights the ongoing threat landscape in the cybersecurity world. It is essential for organizations and individuals alike to stay informed about the latest security patches and best practices to protect against these evolving threats. By doing so, we can create a more secure digital environment that is better equipped to withstand the ever-present threat of cyber attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Critical-Unpatched-Telnetd-Flaw-Enables-Unauthenticated-Root-Remote-Code-Execution-ehn.shtml

  • https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html

  • https://nikto.online/news/2026/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce-via-port-23.html

  • https://nvd.nist.gov/vuln/detail/CVE-2026-32746

  • https://www.cvedetails.com/cve/CVE-2026-32746/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-24061

  • https://www.cvedetails.com/cve/CVE-2026-24061/


  • Published: Wed Mar 18 08:56:09 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us