By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
Computing

Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access

News Room
Last updated: 2026/01/22 at 11:56 AM
News Room Published 22 January 2026
Share
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
SHARE

Ravie LakshmananJan 22, 2026Vulnerability / Linux

A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years.

The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all versions of GNU InetUtils from version 1.9.3 up to and including version 2.7.

“Telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a ‘-f root’ value for the USER environment variable,” according to a description of the flaw in the NIST National Vulnerability Database (NVD).

In a post on the oss-security mailing list, GNU contributor Simon Josefsson said the vulnerability can be exploited to gain root access to a target system –

The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.

If the client supply [sic] a carefully crafted USER environment value being the string “-f root”, and passes the telnet(1) -a or –login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.

This happens because the telnetd server do [sic] not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.

Cybersecurity

Josefsson also noted that the vulnerability was introduced as part of a source code commit made on March 19, 2015, which eventually made it to version 1.9.3 release on May 12, 2015. Security researcher Kyu Neushwaistein (aka Carlos Cortes Alvarez) has been credited with discovering and reporting the flaw on January 19, 2026.

As mitigations, it’s advised to apply the latest patches and restrict network access to the telnet port to trusted clients. As temporary workarounds, users can disable telnetd server, or make the InetUtils telnetd use a custom login(1) tool that does not permit use of the ‘-f’ parameter, Josefsson added.

Data gathered by threat intelligence firm GreyNoise shows that 21 unique IP addresses have been observed attempting to execute a remote authentication bypass attack by leveraging the flaw over the past 24 hours. All the IP addresses, which originate from Hong Kong, the U.S., Japan, the Netherlands, China, Germany, Singapore, and Thailand, have been flagged as malicious.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Save : The DJI Mic 2 is down to its lowest price ever at Amazon Save $70: The DJI Mic 2 is down to its lowest price ever at Amazon
Next Article January 22, 2026 – Siri AI chatbot, Apple AI pin January 22, 2026 – Siri AI chatbot, Apple AI pin
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Kate Hudson Is in the 2026 Oscar Race. Here's the Movie That Got Her Nominated
Kate Hudson Is in the 2026 Oscar Race. Here's the Movie That Got Her Nominated
News
One of Our Favorite Smart Plugs for Apple Users Is  Off
One of Our Favorite Smart Plugs for Apple Users Is $15 Off
Gadget
Apple’s John Ternus Takes Over Design in Latest CEO Succession Move
Apple’s John Ternus Takes Over Design in Latest CEO Succession Move
News
What 100 GitHub Projects Reveal About Personal Data in Modern Software | HackerNoon
What 100 GitHub Projects Reveal About Personal Data in Modern Software | HackerNoon
Computing

You Might also Like

What 100 GitHub Projects Reveal About Personal Data in Modern Software | HackerNoon
Computing

What 100 GitHub Projects Reveal About Personal Data in Modern Software | HackerNoon

7 Min Read
How Static and Hybrid Analysis Can Cut Privacy Review Effort by 95% | HackerNoon
Computing

How Static and Hybrid Analysis Can Cut Privacy Review Effort by 95% | HackerNoon

8 Min Read
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
Computing

New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack

9 Min Read
Optimization Log: How I Pushed a 2,750-Word Guide to 97/100 PageSpeed for AI Search | HackerNoon
Computing

Optimization Log: How I Pushed a 2,750-Word Guide to 97/100 PageSpeed for AI Search | HackerNoon

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?