· Théo Turletti · Anantis Security Labs  · 2 min read

CVE-2026-24061: A Decade of Silent Root Access

An 11-year-old vulnerability in GNU telnetd allows attackers to bypass authentication and gain immediate root shell access.

An 11-year-old vulnerability in GNU telnetd allows attackers to bypass authentication and gain immediate root shell access.

What is CVE-2026-24061?

CVE-2026-24061 is a critical authentication bypass vulnerability impacting GNU InetUtils telnetd, a legacy remote access service still present on many embedded devices, network appliances, and OT environments. The issue arises from insecure processing of the USER environment variable transmitted via the Telnet protocol, which is passed directly to /usr/bin/login without any sanitization. Exploitation lets unauthenticated attackers inject arbitrary command-line flags, granting instant root shell access.

  • Severity: Critical
  • CVSS Score: 9.8
  • EPSS Score: 29%
  • Published: January 19, 2026
  • Impact: Unauthenticated Remote Code Execution as Root

This flaw affects all systems running GNU InetUtils telnetd up to and including version 2.7-2. Although Telnet is a legacy protocol, global scans indicate over 1 million devices are still running Telnet servers. The vulnerability is actively exploited in the wild.


How the Vulnerability Works

GNU InetUtils telnetd delegates authentication to /usr/bin/login. The flaw lies in how the daemon handles the USER environment variable:

  1. Expected behavior: telnetd passes the username to login for verification.
  2. Vulnerable path: The USER variable can be sent via the Telnet NEW-ENVIRON option. telnetd previously inserted this value directly into the login command without any sanitization.
  3. Exploit: Setting USER="-f root" results in the command:
Terminal window
/usr/bin/login -h <host> -f root

The -f flag tells login to skip authentication entirely, granting an immediate root shell.

Impact: Full system compromise without credentials or user interaction.


Exploitation Steps

  1. Attacker connects to a vulnerable Telnet service.
  2. Negotiates the NEW-ENVIRON option to set USER="-f root".
  3. telnetd passes this value to /usr/bin/login.
  4. Root shell is immediately granted.

Proof-of-concept command:

Terminal window
USER='-f root' telnet -a <target_ip>

Introducing Preemptive Detection with TrapEye

Although updated versions patch this flaw, many legacy systems remain exposed. Our platform automatically monitors for:

  • Active exploitation attempts
  • Malicious environment variable patterns
  • Suspicious Telnet connection activity

TrapEye provides real-time alerts and attacker fingerprinting, enabling your team to isolate affected systems and stop attacks before damage occurs.

After several weeks of exposing a public trap, here is the aggregated Indicators of Compromise (IoCs) collected by Anantis.

AttributeValues
Unique IPs18
Top GeolocationThe Netherlands
Top ASNAS51396 Pfcloud UG

Recommendations for Organizations

  • Patch immediately to GNU InetUtils 2.7-2 or later.
  • Disable Telnet wherever possible and use SSH for remote access.
  • Segment legacy systems to reduce risk exposure.
  • Deploy deception traps to detect exploitation in real time.

Conclusion

CVE-2026-24061 highlights the dangers of legacy protocols and the importance of proactive detection. A single oversight in handling the USER environment variable enabled unauthenticated root access for over a decade.

With TrapEye, your team gains immediate visibility into these exploitation attempts and can respond before damage occurs.

References

Insights

Boost your cybersecurity

Get our latest articles and practical security tips delivered straight to your inbox.

Related Posts

View All Posts »