Critical GNU InetUtils Telnetd Flaw: How Attackers Bypass Login & Gain Root Access (CVE-2026-24061) (2026)

A shocking security revelation has emerged, highlighting a critical flaw in the GNU InetUtils telnet daemon that has gone unnoticed for over a decade. This vulnerability, with a severity rating of 9.8 out of 10, affects all versions of GNU InetUtils from 1.9.3 to 2.7, and it's a doozy.

The issue, tracked as CVE-2026-24061, allows remote attackers to bypass authentication and gain root access to target systems. Here's how it works: the telnetd server, when receiving a specially crafted USER environment variable from a client, automatically logs the client in as root, bypassing standard authentication processes. This is due to the server's failure to sanitize the USER environment variable before passing it to the login command, which then uses the '-f' parameter to bypass authentication.

But here's where it gets controversial: this vulnerability was introduced in a source code commit back in 2015, and it's only now, nearly 11 years later, that it has been discovered and reported by security researcher Kyu Neushwaistein (aka Carlos Cortes Alvarez).

Mitigation strategies include applying the latest patches and restricting network access to the telnet port. As a temporary fix, users can disable the telnetd server or use a custom login tool that doesn't allow the '-f' parameter. However, these measures might not be enough to stop determined attackers, as threat intelligence data shows 21 unique IP addresses attempting to exploit this flaw over the past 24 hours, all originating from various countries including Hong Kong, the U.S., and Japan.

So, what does this mean for the average user? Well, it's a stark reminder of the importance of keeping software up-to-date and being vigilant about network security. But it also raises questions about the responsibility of open-source contributors and the potential risks associated with long-standing vulnerabilities.

What are your thoughts on this critical flaw and its implications? We'd love to hear your opinions in the comments below!

Critical GNU InetUtils Telnetd Flaw: How Attackers Bypass Login & Gain Root Access (CVE-2026-24061) (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Edwin Metz

Last Updated:

Views: 5699

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.