HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Critical Remote Code Execution Vulnerability (CVE‑2026‑32746) in GNU inetutils telnetd 2.7 Allows Pre‑Auth Root Takeover

A pre‑authentication remote code execution flaw (CVE‑2026‑32746) in GNU inetutils telnetd 2.7 lets attackers execute arbitrary commands as root by exploiting a buffer overflow in the LINEMODE SLC handler. The vulnerability affects any system exposing telnet, posing a high‑risk third‑party exposure.

LiveThreat™ Intelligence · 📅 May 08, 2026· 📰 exploit-db.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
exploit-db.com

Critical Remote Code Execution Vulnerability (CVE‑2026‑32746) in GNU inetutils telnetd 2.7 Allows Pre‑Auth Root Takeover

What Happened – A buffer‑overflow in the LINEMODE SLC handler of GNU inetutils telnetd 2.7 (CVE‑2026‑32746) enables an unauthenticated attacker to execute arbitrary code as root before any login prompt. The flaw is triggered by sending a crafted LINEMODE SLC sub‑option containing more than 40 triplets, overflowing a 108‑byte static buffer.

Why It Matters for TPRM

  • Pre‑auth RCE on a service that typically runs with elevated privileges can compromise any host that exposes telnet.
  • Many legacy and IoT devices still ship telnetd; a single vulnerable instance can become a foothold for lateral movement across a supply chain.
  • The vulnerability carries a CVSS 9.8 score, indicating a critical risk that must be addressed immediately in third‑party environments.

Who Is Affected – Enterprises and service providers that run GNU inetutils telnetd ≤ 2.7 on Linux/Unix systems, including MSPs, cloud‑hosted VMs, network‑equipment vendors, and any organization exposing telnet to untrusted networks.

Recommended Actions

  • Verify whether telnetd 2.7 or earlier is present on any asset; inventory all systems exposing port 23.
  • Apply the upstream patch (PR #17) or upgrade to inetutils ≥ 2.8 where the flaw is fixed.
  • If immediate patching is not possible, block inbound telnet traffic at the perimeter and enforce network segmentation.
  • Conduct a post‑remediation scan to confirm the vulnerability is mitigated.

Technical Notes – The flaw resides in add_slc() (telnetd/slc.c) which writes 3 bytes per SLC triplet into a fixed 108‑byte buffer without bounds checking. Exploitation results in corruption of the slcptr pointer and a subsequent out‑of‑bounds write, leading to full pre‑authentication remote code execution as root. CVE‑2026‑32746 has a CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Source: Exploit‑DB 52556

📰 Original Source
https://www.exploit-db.com/exploits/52556

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.