Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks

800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks

Posted on January 26, 2026January 26, 2026 By CWS

A vital authentication bypass vulnerability within the telnetd part of GNU Inetutils has uncovered roughly 800,000 internet-accessible Telnet cases to unauthenticated distant code execution (RCE).

Tracked as CVE-2026-24061 with a CVSS rating of 9.8, the flaw permits attackers to realize root-level entry with out legitimate credentials, posing a extreme danger to uncovered infrastructure worldwide.

Vulnerability Particulars

The vulnerability stems from an argument injection flaw in telnetd variations 1.9.3 by 2.7.

The telnetd server fails to sanitize the USER setting variable earlier than passing it to/usr/bin/login, permitting attackers to inject the string “-f root” and bypass authentication totally.

When an attacker connects utilizing telnet -a or –login with USER set to “-f root”, the login course of interprets the “-f” flag as a force-login parameter, routinely granting root entry with out performing authentication checks.

The vulnerability was launched in a March 2015 supply code commit that remained undetected for practically 11 years throughout main Linux distributions, together with Debian, Ubuntu, Kali Linux, and Trisquel.

Proof-of-concept exploits have been publicly launched and are actively being leveraged within the wild.

GreyNoise detected real-world exploitation inside 18 hours of public disclosure, capturing 1,525 packets throughout 60 Telnet classes from 18 distinctive attacker IPs between January 21-22, 2026.

Nearly all of assaults (83.3%) focused root consumer entry, with post-exploitation actions together with SSH key persistence, system reconnaissance, and makes an attempt to deploy malware.

Organizations ought to instantly improve to GNU InetUtils model 2.8 or later.

Relating to CVE-2026-24061 in GNU InetUtils telnetd: whereas we aren’t scanning for it explicitly (on account of present lack of means to examine in a secure manner, we share – and have for years – knowledge on uncovered cases in our Accessible Telnet Report: uncovered pic.twitter.com/cPLGvOtnZK— The Shadowserver Basis (@Shadowserver) January 26, 2026

For programs unable to improve, vital mitigations embrace: turning off the telnetd service totally, blocking TCP port 23 at community perimeter firewalls, and proscribing Telnet entry to trusted purchasers solely.

The Shadowserver Basis’s Accessible Telnet Report may help organizations determine uncovered cases on their networks.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:800K, Attacks, Exposed, GNU, InetUtils, Instances, RCE, telnetd

Post navigation

Previous Post: Curl to End Bug Bounty Following Low-Quality AI-Generated Vulnerability Reports
Next Post: Nova Ransomware Allegedly Claiming Breach of KPMG Netherlands

Related Posts

AI App Data Breach Exposes Millions of User Messages AI App Data Breach Exposes Millions of User Messages Cyber Security News
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code Cyber Security News
New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Cyber Security News
Critical Security Update Addresses Veeam RCE Vulnerabilities Critical Security Update Addresses Veeam RCE Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark