• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical telnetd flaw (cve 2026 32746) enables unauthenticated root rce via port

Critical Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23

You are here: Home / General Cyber Security News / Critical Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
March 18, 2026

Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges.

The vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of out-of-bounds write in the LINEMODE Set Local Characters (SLC) suboption handler that results in a buffer overflow, ultimately paving the way for code execution.

Israeli cybersecurity company Dream, which discovered and reported the flaw on March 11, 2026, said it affects all versions of the Telnet service implementation through 2.7. A fix for the vulnerability is expected to be available no later than April 1, 2026.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“An unauthenticated remote attacker can exploit this by sending a specially crafted message during the initial connection handshake — before any login prompt appears,” Dream said in an alert. “Successful exploitation can result in remote code execution as root.”

“A single network connection to port 23 is sufficient to trigger the vulnerability. No credentials, no user interaction, and no special network position are required.”

The SLC handler, per Dream, processes option negotiation during the Telnet protocol handshake. But given that the flaw can be triggered before authentication, an attacker can weaponize it immediately after establishing a connection by sending specially crafted protocol messages.

Successful exploitation could result in complete system compromise if telnetd runs with root privileges. This, in turn, could open the door to various post-exploitation actions, including the deployment of persistent backdoors, data exfiltration, and lateral movement by using the compromised hosts as pivot points.

“An unauthenticated attacker can trigger it by connecting to port 23 and sending a crafted SLC suboption with many triplets,” according to Dream security researcher Adiel Sol.

“No login is required; the bug is hit during option negotiation, before the login prompt. The overflow corrupts memory and can be turned into arbitrary writes. In practice, this can lead to remote code execution. Because telnetd usually runs as root (e.g., under inetd or xinetd), a successful exploit would give the attacker full control of the system.”

Cybersecurity

In the absence of a fix, it’s advised to disable the service if it’s not necessary, run telnetd without root privileges where required, block port 23 at the network perimeter and host-based firewall level to restrict access, and isolate Telnet access.

The disclosure comes nearly two months after another critical security flaw was disclosed in GNU InetUtils telnetd (CVE-2026-24061, CVSS score: 9.8) that could be leveraged to gain root access to a target system. The vulnerability has since come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «ai flaws in amazon bedrock, langsmith, and sglang enable data AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
  • AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
  • LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
  • AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds
  • Konni Deploys EndRAT Through Spear-Phishing, Uses KakaoTalk to Propagate Malware
  • CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
  • GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
  • ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
  • Why Security Validation Is Becoming Agentic
  • ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

Copyright © TheCyberSecurity.News, All Rights Reserved.