CVE-2026-24061 – GNU InetUtils telnetd Authentication Bypass... #1832
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is
CVE-2026-24061 is a critical authentication bypass in GNU InetUtils telnetd that lets an unauthenticated remote attacker obtain an immediate root shell by abusing Telnet NEW_ENVIRON to inject a maliciousUSERenvironment variable, which is then unsafely interpolated into the argument list for/usr/bin/login.Affected component / versions / severity
Telnet NEW_ENVIRON → privileged helper argv injection: When a Telnet daemon (or any network service) accepts client-controlled environment variables via protocol negotiation (e.g., Telnet
NEW_ENVIRON) and then interpolates those values into a command template used to spawn a privileged helper (e.g.,/usr/bin/login), the attacker can turn “data” into “options” by ensuring the injected value starts with-. This yields argv-level option injection, enabling authentication bypass or code execution if the helper supports dangerous flags (e.g.,login -f <user>to skip authentication).Defensive pattern (input sanitization for exec templates): Before substituting any untrusted value into arguments passed to
exec*, enforce a strict character policy (reject leading-, reject whitespace and metacharacters, and/or use an allowlist). In this case, asanitize()gate using 🤖 Agent ActionsSummary:
Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.