Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Telnetd Security Flaw Allows Remote Code Execution

Critical Telnetd Security Flaw Allows Remote Code Execution

Posted on March 18, 2026 By CWS

Cybersecurity experts have revealed a significant vulnerability in the GNU InetUtils telnet daemon (telnetd) that permits unauthenticated remote attackers to execute arbitrary code with elevated privileges. This flaw, identified as CVE-2026-32746, boasts a CVSS score of 9.8, underscoring its severity.

Understanding the Vulnerability

Tracked under CVE-2026-32746, this issue arises from an out-of-bounds write in the LINEMODE Set Local Characters (SLC) suboption handler, causing a buffer overflow. Such a flaw could lead to arbitrary code execution, posing a critical risk to affected systems.

Israeli cybersecurity firm Dream, which identified and reported the issue on March 11, 2026, stated that all versions of the Telnet service up to 2.7 are impacted. A patch is anticipated by April 1, 2026, to address this vulnerability.

Potential Impact and Exploitation

The flaw can be exploited during the initial connection handshake, prior to any login prompts, allowing attackers to execute remote code as root. This is achieved by sending a specifically crafted message to port 23. Notably, this does not require any credentials or user interaction.

Dream explains that the vulnerability manifests during option negotiation in the Telnet protocol handshake, allowing attackers immediate exploitation post-connection by dispatching crafted protocol messages. If exploited successfully, it could lead to complete system compromise, enabling malicious activities such as installing persistent backdoors, data theft, and lateral movement using the compromised system.

Mitigation Strategies

In light of the absence of a fix, security experts advise disabling Telnet services if not essential, running telnetd without root privileges, blocking port 23 at network perimeters, and using firewall rules to limit access. Isolating Telnet access is also recommended to mitigate potential risks.

This disclosure follows another critical vulnerability in GNU InetUtils telnetd (CVE-2026-24061) reported two months prior, which has been actively exploited, according to the U.S. Cybersecurity and Infrastructure Security Agency. The recurrence of such vulnerabilities highlights the need for vigilant security practices and timely updates.

The Hacker News Tags:buffer overflow, CVE, CVE-2026-32746, Cybersecurity, data protection, Dream, network security, remote code execution, security flaw, telnetd, Vulnerability

Post navigation

Previous Post: Vishing Attack Exploits Microsoft Teams for Quick Assist Breach
Next Post: Critical Vulnerability in Ubuntu Allows Root Access

Related Posts

Qilin and Warlock Ransomware Exploit Driver Vulnerabilities Qilin and Warlock Ransomware Exploit Driver Vulnerabilities The Hacker News
Wazuh for Regulatory Compliance Wazuh for Regulatory Compliance The Hacker News
How Small Teams Can Secure Their Google Workspace How Small Teams Can Secure Their Google Workspace The Hacker News
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners The Hacker News
How to Protect Your Backups How to Protect Your Backups The Hacker News
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark