Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Telnetd Security Flaw Allows Remote Code Execution

Critical Telnetd Security Flaw Allows Remote Code Execution

Posted on March 18, 2026 By CWS

Cybersecurity experts have revealed a significant vulnerability in the GNU InetUtils telnet daemon (telnetd) that permits unauthenticated remote attackers to execute arbitrary code with elevated privileges. This flaw, identified as CVE-2026-32746, boasts a CVSS score of 9.8, underscoring its severity.

Understanding the Vulnerability

Tracked under CVE-2026-32746, this issue arises from an out-of-bounds write in the LINEMODE Set Local Characters (SLC) suboption handler, causing a buffer overflow. Such a flaw could lead to arbitrary code execution, posing a critical risk to affected systems.

Israeli cybersecurity firm Dream, which identified and reported the issue on March 11, 2026, stated that all versions of the Telnet service up to 2.7 are impacted. A patch is anticipated by April 1, 2026, to address this vulnerability.

Potential Impact and Exploitation

The flaw can be exploited during the initial connection handshake, prior to any login prompts, allowing attackers to execute remote code as root. This is achieved by sending a specifically crafted message to port 23. Notably, this does not require any credentials or user interaction.

Dream explains that the vulnerability manifests during option negotiation in the Telnet protocol handshake, allowing attackers immediate exploitation post-connection by dispatching crafted protocol messages. If exploited successfully, it could lead to complete system compromise, enabling malicious activities such as installing persistent backdoors, data theft, and lateral movement using the compromised system.

Mitigation Strategies

In light of the absence of a fix, security experts advise disabling Telnet services if not essential, running telnetd without root privileges, blocking port 23 at network perimeters, and using firewall rules to limit access. Isolating Telnet access is also recommended to mitigate potential risks.

This disclosure follows another critical vulnerability in GNU InetUtils telnetd (CVE-2026-24061) reported two months prior, which has been actively exploited, according to the U.S. Cybersecurity and Infrastructure Security Agency. The recurrence of such vulnerabilities highlights the need for vigilant security practices and timely updates.

The Hacker News Tags:buffer overflow, CVE, CVE-2026-32746, Cybersecurity, data protection, Dream, network security, remote code execution, security flaw, telnetd, Vulnerability

Post navigation

Previous Post: Vishing Attack Exploits Microsoft Teams for Quick Assist Breach
Next Post: Critical Vulnerability in Ubuntu Allows Root Access

Related Posts

Notepad++ Hosting Compromise Linked to Chinese Hackers Notepad++ Hosting Compromise Linked to Chinese Hackers The Hacker News
67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers The Hacker News
Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally The Hacker News
Infostealer Targets OpenClaw AI, Exposes Security Flaws Infostealer Targets OpenClaw AI, Exposes Security Flaws The Hacker News
China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
  • Microsoft Pauses Automatic 365 Copilot App Installations
  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
  • Microsoft Pauses Automatic 365 Copilot App Installations
  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark