Invaders
Back to Blog
INVADERS
BlogGet Protected
  1. Home
  2. Blog
  3. vulnerability
  4. CVE-2026-32746: Critical GNU Inetutils telnetd flaw exposes legacy systems to root RCE
vulnerability

CVE-2026-32746: Critical GNU Inetutils telnetd flaw exposes legacy systems to root RCE

Lucas OliveiraLucas OliveiraResearch
March 19, 2026·6 min read

Summarize with:

ChatGPTClaudePerplexityGoogle AI
CVE-2026-32746: Critical GNU Inetutils telnetd flaw exposes legacy systems to root RCE

Share

CVE-2026-32746: Critical GNU Inetutils telnetd flaw exposes legacy systems to root RCE

Executive Summary

CVE-2026-32746 is a critical pre-authentication vulnerability in GNU Inetutils telnetd that can let an unauthenticated attacker achieve remote code execution as root by sending a crafted LINEMODE SLC payload during the initial Telnet handshake. The bug affects GNU Inetutils through version 2.7 and can be triggered before the login prompt appears, which makes it especially dangerous on exposed or poorly segmented legacy systems.

The technical issue is serious on its own, but the bigger defender lesson is where Telnet still survives. Old remote administration services remain present in industrial networks, legacy appliances, embedded environments, and long-lifecycle infrastructure. In those environments, a single internet-exposed or reachable port 23 service can become an immediate exploit path to full host compromise.

What happened?

According to the public GNU security report and the NVD description, the flaw sits in the LINEMODE Set Local Characters (SLC) handling logic inside telnetd. The vulnerable add_slc() logic appends response data into a fixed-size buffer without properly checking available space.

That means a remote attacker can connect to port 23, negotiate LINEMODE, and send a specially crafted SLC suboption containing enough triplets to overflow the buffer. Researchers said that after enough out-of-range function entries are processed, memory corruption follows and the condition can be turned into arbitrary writes and then code execution.

The most important operational detail is timing: no authentication is required. The vulnerable path is reached during protocol negotiation, before any user login. If telnetd is running with root privileges, successful exploitation can hand the attacker full control of the target system.

Why defenders should care

1. Legacy does not mean low risk

Telnet is old, but it is not gone. It still appears in older appliances, unmanaged edge devices, lab systems, and OT/ICS environments where replacement cycles are slow. That makes this disclosure relevant far beyond hobbyist systems.

2. Pre-auth root RCE is a worst-case scenario

A single network connection can be enough to compromise the service. No user interaction, credentials, or social engineering are required. That combination is exactly what makes remote code execution in exposed infrastructure so urgent.

3. The blast radius can exceed one host

If the affected system sits inside a flat internal network, successful exploitation can become a bridge to credential theft, lateral movement, or service disruption. This is where network segmentation and privileged service isolation matter.

Technical details in plain English

The GNU report describes a fixed 108-byte buffer used to build SLC responses, with only 104 bytes available for actual data after headers. Each unsupported SLC triplet can add three bytes to that response. Because the code does not stop when the buffer is full, a long enough sequence can push writes past the end of the buffer.

In practice, the report says a crafted suboption with roughly 40 to 50 malicious triplets is enough to trigger memory corruption. Later writes use the corrupted pointer state, which is what turns a simple overflow into a path toward controlled memory writes and potential code execution.

For defenders, the takeaway is simple: this is not just a crash bug. It is a remotely reachable memory-corruption flaw on a service that often runs with elevated privileges.

Affected versions and patch status

Public reporting says all GNU Inetutils telnetd versions through 2.7 are affected. At the time of disclosure, researchers said a fix was expected no later than April 1, 2026.

That creates a familiar gap between disclosure and remediation. If teams still rely on Telnet for operational reasons, they should assume a period of elevated risk until patched packages are available, tested, and deployed.

Immediate actions to take

🔴 Find every reachable Telnet service

Inventory exposed or internally reachable telnetd instances, especially in legacy server segments, appliance networks, OT environments, and vendor-managed systems.

🔴 Restrict or block port 23

If Telnet is not strictly required, disable it. If it cannot be disabled immediately, block access with host firewalls, perimeter controls, ACLs, VPN restrictions, or jump-host requirements.

🔴 Patch as soon as a fixed build is available

Track the vendor or distro package path for GNU Inetutils and plan an accelerated maintenance window. If you rely on inherited packages in embedded or appliance products, verify whether the vendor has backported a fix.

🟠 Remove unnecessary root execution paths

Where possible, avoid running telnetd with root privileges or with broad inherited permissions. Even partial privilege reduction can lower impact.

🟠 Isolate legacy administration services

Place Telnet-dependent systems in tightly controlled segments and limit east-west connectivity. Older management protocols should never sit in broadly reachable network zones.

🟠 Prepare incident response checks

Look for recent connections to port 23, crashes or restarts of telnetd, unusual child processes, and outbound connections from systems that should only provide simple remote administration.

Detection ideas

Security teams should review:

  • inbound connections to port 23 from untrusted networks
  • sudden telnetd crashes or segmentation faults
  • process launches or shells spawned by inetd/xinetd children
  • unexpected privilege changes on legacy hosts
  • anomalous east-west traffic originating from Telnet-enabled systems

Example Splunk hunt

spl
index=network OR index=syslog OR index=linux
("telnetd" OR "port 23" OR "inetd" OR "xinetd")
("segfault" OR "crash" OR "sh" OR "bash" OR "execve" OR "connection")
| stats count min(_time) as firstSeen max(_time) as lastSeen by host, src_ip, dest_ip, process_name, command_line

Strategic takeaway

CVE-2026-32746 is a reminder that old services can still create modern breach paths. A vulnerable Telnet daemon is not just “legacy tech debt.” On the wrong host, in the wrong network segment, it becomes a pre-auth root access problem.

For defenders, the right response is not only patching. It is using this disclosure to find where insecure management protocols still exist, reduce exposure, and decide which legacy dependencies need an accelerated retirement plan.

What is CVE-2026-32746?

It is a critical buffer-overflow flaw in GNU Inetutils telnetd that can allow unauthenticated remote code execution during Telnet option negotiation.

Does an attacker need valid credentials?

No. The vulnerable path can be triggered before authentication, which is why the bug is classified as pre-authentication remote code execution.

Why is the impact so severe?

Because telnetd often runs with root privileges. If exploitation succeeds, the attacker may gain full control of the affected host.

What should defenders do first?

Identify reachable Telnet services, restrict or disable port 23 where possible, prioritize patches, and isolate legacy systems that cannot be modernized immediately.

References

  1. GNU Inetutils security report on bug-inetutils mailing list
  2. NVD entry for CVE-2026-32746
  3. Dream advisory: Pre-Auth Remote Code Execution via Buffer Overflow in telnetd LINEMODE SLC Handler
  4. The Hacker News coverage of CVE-2026-32746
Tags:
CVE
vulnerability
Network Security
telnetd
L

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.

Hot TopicsLast 7 days
1
#CVE
9p
2
#cyberthreads
7p
3
#Account Takeover
4p
4
#Credential Theft
3p
5
#Data Exfiltration
3p
View all tags →
Categories12
All Articlesvulnerability23Threat Hunting & Intel14Cybercrime5Cloud & Application Security4
Stay Updated

Get the latest cybersecurity insights in your inbox.

You Might Also Like

More in vulnerability →
VMware Aria Operations flaws enable credential theft and privilege escalationvulnerability

VMware Aria Operations flaws enable credential theft and privilege escalation

VMware Aria Operations flaws enable credential theft and privilege escalation Two security flaws in Broadcom VMware Aria Operations show how quickly weak privil...

Lucas OliveiraMar 185m
CVE-2026-32746: telnetd flaw enables unauthenticated root RCEvulnerability

CVE-2026-32746: telnetd flaw enables unauthenticated root RCE

CVE-2026-32746: Telnetd flaw enables unauthenticated root RCE CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that can allow an unauthenticated remot...

Lucas OliveiraMar 184m
CVE-2026-25769: Wazuh cluster flaw enables RCE on mastervulnerability

CVE-2026-25769: Wazuh cluster flaw enables RCE on master

CVE-2026-25769: Wazuh cluster flaw enables remote code execution CVE-2026-25769 is a critical Wazuh vulnerability that turns trusted cluster communication into...

Lucas OliveiraMar 185m
INVADERS

Providing enterprise-grade cybersecurity solutions to protect organizations from evolving digital threats.

FacebookTwitterLinkedIn

Services

  • Web App Vulnerability Reports
  • Threat Hunting & Intelligence
  • Cybercrime & APT Tracking
  • Incident Response & Remediation

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Security Policy

Company

  • About Us
  • Careers
  • Blog
  • Press

© 2026 Invaders Cybersecurity. All rights reserved.

PrivacyTermsCookies