Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/CyberSecurity News/Hackers Exploit telnetd Vulnerability for Root Access
CyberSecurity News

Hackers Exploit telnetd Vulnerability for Root Access

A critical authentication bypass vulnerability, identified as CVE-2026-24061, within the GNU InetUtils telnetd server is currently under active exploitation. Threat actors are leveraging this flaw to...

Emy Elsamnoudy
Emy Elsamnoudy
January 24, 2026 2 Min Read
0 0

A critical authentication bypass vulnerability, identified as CVE-2026-24061, within the GNU InetUtils telnetd server is currently under active exploitation. Threat actors are leveraging this flaw to gain unauthenticated root access to Linux systems.

The vulnerability, which affects GNU InetUtils versions 1.9.3 through 2.7, enables remote code execution by manipulating the USER environment variable passed during the Telnet negotiation phase.

Grey Noise has detected a coordinated exploitation campaign targeting Telnet services (TCP/23) using the telnetd -f authentication bypass flaw.

The attack leverages a command injection vulnerability where the Telnet daemon passes an unsanitized USER environment variable to the /usr/bin/login binary. By supplying the value -f root, attackers force the login program to treat the session as pre-authenticated, bypassing all credential checks and granting an immediate root shell.

Recent analysis of honeypot traffic has captured 60 unique exploitation attempts from 18 distinct source IP addresses. These attacks range from opportunistic scanning to targeted persistence mechanisms, including SSH key injection and malware deployment.

telnetd Vulnerability CVE-2026-24061

The vulnerability resides in the way telnetd invokes the login program. Typically, telnetd executes /usr/bin/login (running as root) and passes the client-supplied USER variable as the final argument.

The exploitation flow proceeds as follows:

  1. Negotiation: The attacker initiates a Telnet connection and sends a malicious ENVIRON variable.
  2. Injection: The USER variable is set to -f root.
  3. Execution: telnetd executes login -p -h <host> -f root.
  4. Bypass: The -f flag instructs login to skip authentication for the specified user (root), granting a shell.

Analysis of captured attack traffic reveals distinct patterns in attacker behavior. The most prolific source, 178.16.53[.]82, accounted for 12 sessions targeting 10 unique systems, utilizing a consistent payload configuration (9600 baud, XTERM-256COLOR).

Attackers are employing diverse payload configurations to evade simple signature detection:

  • Terminal Speed: 38400 baud and 9600 baud are common, though some attacks negotiate 0,0 (no speed).
  • Terminal Type: Payloads vary between standard XTERM-256COLOR, compatibility mode xterm-256color, and generic UNKNOWN types.
  • Target Users: While root is the primary target (83% of attempts), probes for nobody, daemon, and randomized users like nonexistent123 have been observed.

Upon gaining access, attackers immediately execute reconnaissance commands (uname -a, id, cat /etc/passwd) often wrapped in delimiters (e.g., S…EU…blah) for automated parsing by C2 infrastructure.

More advanced actors attempt to establish persistence. One campaign from 216.106.186[.]24 attempted to append a 3072-bit RSA key to ~/.ssh/authorized_keys. This same actor also attempted to fetch a second-stage Python payload (apps[.]py) from a distribution server, indicating a potential botnet recruitment drive.

CVE ID Severity CVSS Score Affected Versions
CVE-2026-24061 Critical 9.8 (Critical) GNU InetUtils 1.9.3 – 2.7

Indicators of Compromise (IOCs)

Indicator Type Value Context
Attacker IP 178.16.53[.]82 Top source (12 sessions), Reconnaissance
Attacker IP 216.106.186[.]24 SSH Key Injection, Malware Download
Attacker IP 67.220.95[.]16 Malware Distribution, Exploitation
Attacker IP 156.238.237[.]103 Confirmed Root Access (IDS Alert)
Malware URL http://67.220.95[.]16:8000/apps.py Python Payload Delivery
File Name apps[.]py Second-stage payload
SSH Key Comment [email protected][.]hosting Associated with persistence attempts

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerMalwareVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Microsoft Gives FBI BitLocker Keys for Guam Fraud Laptops

Next Post

Sophisticated AiTM Phishing Attacks Target SharePoint Services

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us