Summarize with:

Share
CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that can allow an unauthenticated remote attacker to execute arbitrary code as root through port 23 before any login prompt appears. According to public reporting and the underlying advisory from Dream, the issue stems from an out-of-bounds write in the LINEMODE Set Local Characters (SLC) suboption handler, creating a buffer overflow condition that can be turned into remote code execution.
The issue reportedly affects all versions of the service through 2.7. That makes it especially relevant for legacy systems and older operational environments where Telnet may still be exposed internally or, in worse cases, reachable from untrusted networks.
This flaw is dangerous because exploitation is pre-authentication. An attacker does not need credentials, user interaction, or a privileged network position. A single crafted connection to port 23 during Telnet option negotiation can be enough to trigger memory corruption before the login process even begins.
For defenders, that creates a severe network security problem. If telnetd is running with root privileges, exploitation can lead directly to full system compromise, opening the door to persistence, lateral movement, and follow-on abuse of the affected host.
At the center of the vulnerability is the way telnetd processes LINEMODE Set Local Characters negotiation during the initial handshake. Dream says the vulnerable code mishandles crafted SLC triplets, leading to an out-of-bounds write and memory corruption before authentication.
In practice, that means the attack lands at one of the worst possible points: early in the connection lifecycle, before traditional login protections or access checks can help.
telnetd.The key defensive takeaway is simple: this is not a post-login bug. It can be triggered during the protocol handshake itself.
Illustrative description based on the published advisory:
textAttacker connects to port 23 → Telnet option negotiation begins → Crafted LINEMODE SLC data is processed → Out-of-bounds write corrupts memory → Remote code execution may be achieved as root
Telnet has long been considered unsafe for modern environments because it lacks the protections expected from contemporary remote administration. But this case highlights a second problem beyond plain-text access: legacy services often remain deployed with broad privileges, weak isolation, and little operational scrutiny.
That combination can turn a single vulnerability into a high-impact infrastructure problem. If exposed systems are old, under-monitored, or embedded in critical workflows, even a straightforward service flaw can become a route to wider compromise.
| Date | Event | Status |
|---|---|---|
| 2026-03-11 | Dream reports CVE-2026-32746 to the vendor/maintainers | ⚠️ Initial disclosure |
| 2026-03-18 | Public reporting highlights unauthenticated root RCE risk in GNU InetUtils telnetd | 📢 Public disclosure |
| 2026-04-01 | Fix expected no later than this date, according to reporting | ✅ Patch expected |
| Ongoing | Organizations assess exposed Telnet services and compensating controls | 🔍 Continuing threat |
telnetd instances as urgent remediation targets.telnetd without root privileges where operationally possible.Simple Linux check to find listening Telnet services:
bashss -ltnp | grep ':23 '
CVE-2026-32746 is a reminder that legacy remote access services can still create modern critical risk. An unauthenticated attacker reaching a vulnerable telnetd instance may be able to trigger root-level remote code execution before login, making exposed port 23 services an immediate priority.
For most teams, the practical response is clear: disable Telnet where possible, isolate what remains, block exposure aggressively, and move fast on remediation once a fix is available.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
vulnerabilityCVE-2026-25769: Wazuh cluster flaw enables remote code execution CVE-2026-25769 is a critical Wazuh vulnerability that turns trusted cluster communication into...
vulnerabilityMicrosoft March 2026 Patch Tuesday Fixes 2 Public Zero-Days and Copilot-Linked Excel Risk | 2026 Executive Summary Microsoft's March 2026 Patch Tuesday is not j...
vulnerabilityCisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation | 2026 Executive Summary CVE-2026-20122 and CVE-2026-20128 have turned Cisco's SD-...