Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Posted on January 21, 2026January 21, 2026 By CWS

A crucial distant authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server element.

The flaw, reported by a safety researcher on January 19, 2026, permits unauthenticated attackers to realize root entry by exploiting improper enter sanitization within the telnetd authentication mechanism.

The vulnerability stems from how telnetd invokes the login program. When a telnet shopper connects, telnetd receives a USER atmosphere variable from the distant shopper and passes it on to /usr/bin/login with out sanitization.

An attacker can craft a malicious USER atmosphere variable containing the string “-f root”, a parameter that login (1) interprets as a flag to bypass routine authentication procedures.

By sending a telnet reference to the specifically crafted USER atmosphere variable utilizing telnet’s -a or –login parameter.

An unauthenticated distant person bypasses the login authentication system solely and positive factors quick root-level entry to the system.

The vulnerability was inadvertently launched throughout a code modification on March 19, 2015, and was included in GNU InetUtils model 1.9.3 launched on Could 12, 2015

 The flaw has persevered by means of all subsequent variations as much as and together with model 2.7. GNU InetUtils variations 1.9.3 by means of 2.7 are weak.

In accordance with OpenWall, organizations working telnetd from GNU InetUtils ought to instantly assess their publicity. GNU maintainers advocate three approaches:

ApproachDescriptionDisable telnetdTurn off telnet resulting from insecurity (most well-liked)Prohibit accessAllow solely trusted clientsUpgrade softwareApply patches by Eggert & Josefsson

This vulnerability demonstrates the persistent dangers related to legacy protocols like telnet.

 The authentication bypass permits full system compromise with root privileges, making this a crucial safety risk for any system that exposes telnetd to untrusted networks.

Organizations ought to prioritize both updating GNU InetUtils or instantly turning off telnetd. The provision of patches implies that delayed remediation considerably will increase the chance of compromise.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Critical, GNU, InetUtils, Root, Unauthenticated, Vulnerability

Post navigation

Previous Post: LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
Next Post: Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Related Posts

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News
Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cyber Security News
MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations Cyber Security News
OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification Cyber Security News
Livewire Vulnerability Exposes Millions of Laravel Apps to Remote Code Execution Attacks Cyber Security News
Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark