Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access

Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access

Posted on January 22, 2026January 22, 2026 By CWS

Ravie LakshmananJan 22, 2026Vulnerability / Linux
A crucial safety flaw has been disclosed within the GNU InetUtils telnet daemon (telnetd) that went unnoticed for almost 11 years.
The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It impacts all variations of GNU InetUtils from model 1.9.3 as much as and together with model 2.7.
“Telnetd in GNU Inetutils by means of 2.7 permits distant authentication bypass by way of a ‘-f root’ worth for the USER setting variable,” in response to an outline of the flaw within the NIST Nationwide Vulnerability Database (NVD).
In a submit on the oss-security mailing record, GNU contributor Simon Josefsson mentioned the vulnerability could be exploited to achieve root entry to a goal system –
The telnetd server invokes /usr/bin/login (usually operating as root) passing the worth of the USER setting variable acquired from the consumer because the final parameter.
If the consumer provide [sic] a fastidiously crafted USER setting worth being the string “-f root”, and passes the telnet(1) -a or –login parameter to ship this USER setting to the server, the consumer will probably be mechanically logged in as root bypassing regular authentication processes.
This occurs as a result of the telnetd server do [sic] not sanitize the USER setting variable earlier than passing it on to login(1), and login(1) makes use of the -f parameter to by-pass regular authentication.

Josefsson additionally famous that the vulnerability was launched as a part of a supply code commit made on March 19, 2015, which finally made it to model 1.9.3 launch on Could 12, 2015. Safety researcher Kyu Neushwaistein (aka Carlos Cortes Alvarez) has been credited with discovering and reporting the flaw on January 19, 2026.
As mitigations, it is suggested to use the most recent patches and prohibit community entry to the telnet port to trusted shoppers. As non permanent workarounds, customers can disable telnetd server, or make the InetUtils telnetd use a customized login(1) software that doesn’t allow use of the ‘-f’ parameter, Josefsson added.
Knowledge gathered by risk intelligence agency GreyNoise exhibits that 21 distinctive IP addresses have been noticed trying to execute a distant authentication bypass assault by leveraging the flaw over the previous 24 hours. All of the IP addresses, which originate from Hong Kong, the U.S., Japan, the Netherlands, China, Germany, Singapore, and Thailand, have been flagged as malicious.

The Hacker News Tags:Access, Attackers, Bypass, Critical, Flaw, Gain, GNU, InetUtils, Lets, Login, Root, telnetd

Post navigation

Previous Post: Attackers Infrastructure Exposed Using JA3 Fingerprinting Tool
Next Post: The Upside Down is Real: What Stranger Things Teaches Us About Modern Cybersecurity

Related Posts

IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass The Hacker News
Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More The Hacker News
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems The Hacker News
Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide The Hacker News
Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More The Hacker News
ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News