Invaders
Back to Blog
INVADERS
BlogGet Protected
  1. Home
  2. Blog
  3. vulnerability
  4. CVE-2026-32746: telnetd flaw enables unauthenticated root RCE
vulnerability

CVE-2026-32746: telnetd flaw enables unauthenticated root RCE

Lucas OliveiraLucas OliveiraResearch
March 18, 2026·4 min read

Summarize with:

ChatGPTClaudePerplexityGoogle AI
CVE-2026-32746: telnetd flaw enables unauthenticated root RCE

Share

CVE-2026-32746: Telnetd flaw enables unauthenticated root RCE

CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that can allow an unauthenticated remote attacker to execute arbitrary code as root through port 23 before any login prompt appears. According to public reporting and the underlying advisory from Dream, the issue stems from an out-of-bounds write in the LINEMODE Set Local Characters (SLC) suboption handler, creating a buffer overflow condition that can be turned into remote code execution.

The issue reportedly affects all versions of the service through 2.7. That makes it especially relevant for legacy systems and older operational environments where Telnet may still be exposed internally or, in worse cases, reachable from untrusted networks.

Why CVE-2026-32746 matters

This flaw is dangerous because exploitation is pre-authentication. An attacker does not need credentials, user interaction, or a privileged network position. A single crafted connection to port 23 during Telnet option negotiation can be enough to trigger memory corruption before the login process even begins.

For defenders, that creates a severe network security problem. If telnetd is running with root privileges, exploitation can lead directly to full system compromise, opening the door to persistence, lateral movement, and follow-on abuse of the affected host.

The flaw: out-of-bounds write in the SLC handler

At the center of the vulnerability is the way telnetd processes LINEMODE Set Local Characters negotiation during the initial handshake. Dream says the vulnerable code mishandles crafted SLC triplets, leading to an out-of-bounds write and memory corruption before authentication.

In practice, that means the attack lands at one of the worst possible points: early in the connection lifecycle, before traditional login protections or access checks can help.

How the exploit works

  1. Connect to port 23 on a vulnerable host running GNU InetUtils telnetd.
  2. Begin Telnet option negotiation as part of the normal handshake sequence.
  3. Send a crafted SLC suboption payload containing enough malformed triplets to corrupt memory.
  4. Trigger the out-of-bounds write inside the vulnerable handler.
  5. Reach code execution as root when the corruption is successfully weaponized.

The key defensive takeaway is simple: this is not a post-login bug. It can be triggered during the protocol handshake itself.

Illustrative description based on the published advisory:

text
Attacker connects to port 23
→ Telnet option negotiation begins
→ Crafted LINEMODE SLC data is processed
→ Out-of-bounds write corrupts memory
→ Remote code execution may be achieved as root

Why legacy remote access keeps creating risk

Telnet has long been considered unsafe for modern environments because it lacks the protections expected from contemporary remote administration. But this case highlights a second problem beyond plain-text access: legacy services often remain deployed with broad privileges, weak isolation, and little operational scrutiny.

That combination can turn a single vulnerability into a high-impact infrastructure problem. If exposed systems are old, under-monitored, or embedded in critical workflows, even a straightforward service flaw can become a route to wider compromise.

Timeline defenders should know

DateEventStatus
2026-03-11Dream reports CVE-2026-32746 to the vendor/maintainers⚠️ Initial disclosure
2026-03-18Public reporting highlights unauthenticated root RCE risk in GNU InetUtils telnetd📢 Public disclosure
2026-04-01Fix expected no later than this date, according to reporting✅ Patch expected
OngoingOrganizations assess exposed Telnet services and compensating controls🔍 Continuing threat

Immediate defensive actions

🔴 Exposure reduction

  • Disable Telnet wherever it is no longer operationally necessary.
  • Block port 23 at the perimeter and with host-based firewall rules.
  • Restrict access to any remaining Telnet service to tightly controlled management paths.
  • Treat internet-exposed or broadly reachable telnetd instances as urgent remediation targets.

🟠 Hardening and containment

  • Run telnetd without root privileges where operationally possible.
  • Segment legacy administration services from broader production networks.
  • Review whether Telnet can be replaced fully with SSH or another modern alternative.
  • Inspect affected systems for signs of unexpected access or command execution if exposure has existed.

🟡 Detection and validation

  • Inventory every system still exposing Telnet internally or externally.
  • Hunt for unusual connection attempts to port 23 from untrusted hosts.
  • Review legacy systems for weak monitoring coverage and add compensating telemetry where feasible.
  • Prioritize incident review if Telnet exposure overlaps with high-value systems or flat network segments.

Simple Linux check to find listening Telnet services:

bash
ss -ltnp | grep ':23 '

Bottom line

CVE-2026-32746 is a reminder that legacy remote access services can still create modern critical risk. An unauthenticated attacker reaching a vulnerable telnetd instance may be able to trigger root-level remote code execution before login, making exposed port 23 services an immediate priority.

For most teams, the practical response is clear: disable Telnet where possible, isolate what remains, block exposure aggressively, and move fast on remediation once a fix is available.

References

  1. The Hacker News coverage
  2. Dream advisory
  3. GNU inetutils mailing list note
  4. NVD entry
L

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.

Hot TopicsLast 7 days
1
#CVE
8p
2
#cyberthreads
7p
3
#Account Takeover
4p
4
#Credential Theft
3p
5
#Data Exfiltration
3p
View all tags →
Categories12
All Articlesvulnerability21Threat Hunting & Intel11Cybercrime5Cloud & Application Security4
Stay Updated

Get the latest cybersecurity insights in your inbox.

You Might Also Like

More in vulnerability →
CVE-2026-25769: Wazuh cluster flaw enables RCE on mastervulnerability

CVE-2026-25769: Wazuh cluster flaw enables RCE on master

CVE-2026-25769: Wazuh cluster flaw enables remote code execution CVE-2026-25769 is a critical Wazuh vulnerability that turns trusted cluster communication into...

Lucas OliveiraMar 185m
Microsoft March 2026 Patch Tuesday Fixes 2 Public Zero-Days and Copilot-Linked Excel Riskvulnerability

Microsoft March 2026 Patch Tuesday Fixes 2 Public Zero-Days and Copilot-Linked Excel Risk

Microsoft March 2026 Patch Tuesday Fixes 2 Public Zero-Days and Copilot-Linked Excel Risk | 2026 Executive Summary Microsoft's March 2026 Patch Tuesday is not j...

Lucas OliveiraMar 176m
Cisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitationvulnerability

Cisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation

Cisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation | 2026 Executive Summary CVE-2026-20122 and CVE-2026-20128 have turned Cisco's SD-...

Lucas OliveiraMar 166m
INVADERS

Providing enterprise-grade cybersecurity solutions to protect organizations from evolving digital threats.

FacebookTwitterLinkedIn

Services

  • Web App Vulnerability Reports
  • Threat Hunting & Intelligence
  • Cybercrime & APT Tracking
  • Incident Response & Remediation

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Security Policy

Company

  • About Us
  • Careers
  • Blog
  • Press

© 2026 Invaders Cybersecurity. All rights reserved.

PrivacyTermsCookies