HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Remote Root Privilege Escalation via GNU InetUtils Telnetd (CVE‑2026‑24061) Affects Linux Servers

A critical vulnerability (CVE‑2026‑24061) in GNU InetUtils telnetd (versions 2.0‑2.6) lets an unauthenticated attacker inject a crafted USER variable, bypassing authentication and spawning a root shell. Any Linux host exposing telnet is at risk, making it a high‑priority TPRM concern.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
exploit-db.com

Remote Root Privilege Escalation via GNU InetUtils Telnetd (CVE‑2026‑24061) Impacts Linux Servers

What Happened – A newly disclosed vulnerability (CVE‑2026‑24061) in GNU InetUtils telnetd (versions 2.0‑2.6) allows an unauthenticated remote attacker to bypass authentication by injecting a crafted USER environment variable during the Telnet NEW‑ENVIRON sub‑negotiation. The injected -f root flag forces /bin/login to grant a root shell without a password.

Why It Matters for TPRM

  • The flaw gives attackers immediate root access to any Linux host exposing telnet, a common legacy service in many third‑party environments.
  • Compromise of a single server can lead to lateral movement across a vendor’s network, exposing downstream customers.
  • Many managed‑service providers and cloud‑hosted workloads still run telnet for legacy automation, widening the attack surface.

Who Is Affected – Enterprises that run Linux servers with GNU InetUtils telnetd ≤ 2.6, including SaaS providers, MSPs, cloud‑hosting platforms, and any organization that retains telnet for internal tooling.

Recommended Actions

  • Inventory all assets running GNU InetUtils telnetd and verify version.
  • Upgrade to GNU InetUtils ≥ 2.7‑2 (or apply vendor‑provided patches).
  • Disable telnet where possible; replace with SSH or other secure remote access protocols.
  • Review firewall rules to block inbound telnet (TCP 23) from untrusted networks.
  • Conduct a focused penetration test to confirm remediation.

Technical Notes – The exploit leverages environment‑variable injection (NEW‑ENVIRON) to pass USER="-f root" to /bin/login. No CVE‑specific patch existed at disclosure; mitigation relies on version upgrade or service disablement. Affected data types include system credentials and any data accessible to the compromised root account. Source: Exploit‑DB 52524

📰 Original Source
https://www.exploit-db.com/exploits/52524

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.