Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Posted on January 21, 2026January 21, 2026 By CWS

A crucial distant authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server element.

The flaw, reported by a safety researcher on January 19, 2026, permits unauthenticated attackers to realize root entry by exploiting improper enter sanitization within the telnetd authentication mechanism.

The vulnerability stems from how telnetd invokes the login program. When a telnet shopper connects, telnetd receives a USER atmosphere variable from the distant shopper and passes it on to /usr/bin/login with out sanitization.

An attacker can craft a malicious USER atmosphere variable containing the string “-f root”, a parameter that login (1) interprets as a flag to bypass routine authentication procedures.

By sending a telnet reference to the specifically crafted USER atmosphere variable utilizing telnet’s -a or –login parameter.

An unauthenticated distant person bypasses the login authentication system solely and positive factors quick root-level entry to the system.

The vulnerability was inadvertently launched throughout a code modification on March 19, 2015, and was included in GNU InetUtils model 1.9.3 launched on Could 12, 2015

 The flaw has persevered by means of all subsequent variations as much as and together with model 2.7. GNU InetUtils variations 1.9.3 by means of 2.7 are weak.

In accordance with OpenWall, organizations working telnetd from GNU InetUtils ought to instantly assess their publicity. GNU maintainers advocate three approaches:

ApproachDescriptionDisable telnetdTurn off telnet resulting from insecurity (most well-liked)Prohibit accessAllow solely trusted clientsUpgrade softwareApply patches by Eggert & Josefsson

This vulnerability demonstrates the persistent dangers related to legacy protocols like telnet.

 The authentication bypass permits full system compromise with root privileges, making this a crucial safety risk for any system that exposes telnetd to untrusted networks.

Organizations ought to prioritize both updating GNU InetUtils or instantly turning off telnetd. The provision of patches implies that delayed remediation considerably will increase the chance of compromise.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Critical, GNU, InetUtils, Root, Unauthenticated, Vulnerability

Post navigation

Previous Post: LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
Next Post: Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Related Posts

Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Cyber Security News
New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data Cyber Security News
CISA Warns of Fortinet FortiWeb OS Command Injection Vulnerability Exploited in the Wild CISA Warns of Fortinet FortiWeb OS Command Injection Vulnerability Exploited in the Wild Cyber Security News
ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details Cyber Security News
Critical Vulnerability in Carmaker Portal Let Hackers Unlock the Car Remotely Critical Vulnerability in Carmaker Portal Let Hackers Unlock the Car Remotely Cyber Security News
ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark