Categories: Cyber Security News

Critical Telnetd Vulnerability Allows Remote Code Execution Attacks

A newly disclosed critical vulnerability in GNU Inetutils’ telnetd daemon could allow unauthenticated attackers to gain full control of affected systems, raising serious concerns for legacy environments that still rely on Telnet for remote access.

Tracked as CVE-2026-32746, the flaw carries a CVSS 3.1 score of 9.8 and stems from a classic buffer overflow (CWE-120) in the LINEMODE Set Local Characters (SLC) option handler.

The issue was discovered by Dream Security Labs and affects all versions of GNU Inetutils telnetd up to version 2.7.

Pre-auth RCE via Telnet Handshake

The vulnerability exists in the way telnetd processes LINEMODE SLC negotiation during the initial connection phase.

An attacker can exploit this flaw by sending a specially crafted Telnet message immediately after establishing a TCP connection on port 23 before any authentication occurs.

Because the vulnerable code is triggered during protocol negotiation, no credentials or user interaction are required. A single malicious packet containing an oversized SLC suboption can overflow the buffer, enabling arbitrary code execution.

In typical deployments, telnetd runs with root privileges via inetd or xinetd. As a result, successful exploitation grants attackers full system-level access, allowing them to execute commands, install persistent backdoors, and pivot deeper into the network.

Although Telnet is considered obsolete due to its lack of encryption, it remains widely used in industrial control systems (ICS), operational technology (OT), and certain government networks.

Many of these environments rely on legacy infrastructure such as PLCs, SCADA systems, and embedded devices that were designed with Telnet as their primary management interface.

Upgrading or replacing these systems is often difficult due to cost, operational constraints, or lack of vendor support. This makes them particularly vulnerable to newly discovered flaws like CVE-2026-32746.

For example, a Telnet-enabled SCADA controller exposed to a network could be remotely compromised with a single connection, potentially allowing attackers to manipulate physical processes such as power distribution or manufacturing operations.

Affected Systems

The vulnerability impacts a wide range of environments where GNU Inetutils telnetd is deployed, including:

  • Linux distributions such as Debian, Ubuntu, RHEL, and SUSE, if telnetd is installed or enabled
  • Embedded systems and IoT devices exposing Telnet interfaces
  • Industrial and OT networks using Telnet for legacy equipment access
  • Servers and network appliances listening on TCP port 23

Any system running the vulnerable code path is exposed as soon as a client initiates a Telnet session and negotiates LINEMODE.

Detection of exploitation attempts is difficult because the attack occurs before authentication, meaning traditional logs such as /var/log/auth.log will not capture malicious activity.

Defenders should instead rely on network-level visibility. Indicators of compromise include unusually large LINEMODE SLC suboption payloads during Telnet sessions.

Security teams are advised to enable firewall logging for inbound connections on port 23 and deploy intrusion detection signatures capable of inspecting Telnet option negotiation traffic.

Packet capture can also help identify abnormal SLC triplet counts, which are a strong signal of exploitation attempts.

No patch is available at the time of disclosure, making immediate mitigation critical. Organizations are strongly advised to disable telnetd wherever possible and transition to secure alternatives such as SSH.

If Telnet cannot be removed, access to port 23 should be strictly limited using firewall rules, and the service should be isolated from untrusted networks.

Running telnetd with reduced privileges can also help minimize the impact of exploitation.

Given the low complexity and pre-auth nature of this vulnerability, defenders should treat any exposed Telnet service as high risk until a fix is released.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Critical Telnetd Vulnerability Allows Remote Code Execution Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Avatar: The Last Airbender Movie Animator Comments on Leak

An animator on The Legend of Aang: The Last Airbender has hit out at the…

22 minutes ago

PlayStation Plus Games Lineup Leaks

Sony's PlayStation Plus games lineup for May 2026 has leaked online, led by Horizon Zero…

22 minutes ago

Daredevil Actor Gives Avengers: Doomsday Update

As speculation mounts that Daredevil star Charlie Cox may appear again on the big screen,…

22 minutes ago

Report alleges ‘inhumane conditions’ at migrant detention facility for families

A new report by two nonprofits says that conditions at the nation's largest migrant detention…

52 minutes ago

Crimson Desert Sales Update

Crimson Desert has now sold 5 million copies, marking a significant milestone less than a…

1 hour ago

Starfield PS5 Sales Estimate

Starfield has seen “lukewarm” sales on PlayStation 5, according to one analyst, who is now…

1 hour ago

This website uses cookies.