Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Posted on January 21, 2026January 21, 2026 By CWS

A crucial distant authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server element.

The flaw, reported by a safety researcher on January 19, 2026, permits unauthenticated attackers to realize root entry by exploiting improper enter sanitization within the telnetd authentication mechanism.

The vulnerability stems from how telnetd invokes the login program. When a telnet shopper connects, telnetd receives a USER atmosphere variable from the distant shopper and passes it on to /usr/bin/login with out sanitization.

An attacker can craft a malicious USER atmosphere variable containing the string “-f root”, a parameter that login (1) interprets as a flag to bypass routine authentication procedures.

By sending a telnet reference to the specifically crafted USER atmosphere variable utilizing telnet’s -a or –login parameter.

An unauthenticated distant person bypasses the login authentication system solely and positive factors quick root-level entry to the system.

The vulnerability was inadvertently launched throughout a code modification on March 19, 2015, and was included in GNU InetUtils model 1.9.3 launched on Could 12, 2015

 The flaw has persevered by means of all subsequent variations as much as and together with model 2.7. GNU InetUtils variations 1.9.3 by means of 2.7 are weak.

In accordance with OpenWall, organizations working telnetd from GNU InetUtils ought to instantly assess their publicity. GNU maintainers advocate three approaches:

ApproachDescriptionDisable telnetdTurn off telnet resulting from insecurity (most well-liked)Prohibit accessAllow solely trusted clientsUpgrade softwareApply patches by Eggert & Josefsson

This vulnerability demonstrates the persistent dangers related to legacy protocols like telnet.

 The authentication bypass permits full system compromise with root privileges, making this a crucial safety risk for any system that exposes telnetd to untrusted networks.

Organizations ought to prioritize both updating GNU InetUtils or instantly turning off telnetd. The provision of patches implies that delayed remediation considerably will increase the chance of compromise.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Critical, GNU, InetUtils, Root, Unauthenticated, Vulnerability

Post navigation

Previous Post: LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
Next Post: Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Related Posts

Chrome Security Update Patches Background Fetch API Vulnerability Chrome Security Update Patches Background Fetch API Vulnerability Cyber Security News
Identity and Access Management Trends Shaping 2025 Identity and Access Management Trends Shaping 2025 Cyber Security News
New tool to Remove Copilot, Recall and Other AI tools From Windows 11 New tool to Remove Copilot, Recall and Other AI tools From Windows 11 Cyber Security News
OpenClaw Enhances AI Security with VirusTotal Partnership OpenClaw Enhances AI Security with VirusTotal Partnership Cyber Security News
Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat Cyber Security News
U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News