Unauthenticated Root RCE Vulnerability in Critical Telnetd Flaw (CVE-2026-32746)
- Mar 18
- 2 min read
Key Findings
* Critical unauthenticated remote code execution vulnerability in GNU InetUtils telnetd
* CVE-2026-32746 with CVSS score of 9.8
* Affects all versions through 2.7
* Exploitable by sending crafted message during initial connection handshake
* No authentication required to trigger vulnerability
* Potential for complete system compromise
Background
The vulnerability was discovered by Israeli cybersecurity company Dream on March 11, 2026. It impacts the GNU InetUtils telnet daemon (telnetd) and represents a significant security risk for systems running telnet services. The flaw exists in the LINEMODE Set Local Characters (SLC) suboption handler, which processes protocol negotiation during the initial connection handshake.
Technical Details
The vulnerability stems from an out-of-bounds write in the SLC handler that can be triggered by sending a specially crafted message with multiple protocol option triplets. Because telnetd typically runs with root privileges, a successful exploit can provide an attacker with complete system control. No login credentials or complex network positioning are required - a single connection to port 23 is sufficient to exploit the vulnerability.
Potential Impact
Successful exploitation could enable attackers to:
* Execute arbitrary code with root privileges
* Deploy persistent backdoors
* Exfiltrate sensitive data
* Use compromised systems as network pivot points
Recommended Mitigations
* Disable telnet service if not absolutely necessary
* Run telnetd without root privileges
* Block port 23 at network and host firewall levels
* Isolate and restrict telnet access
* Apply vendor patch when available (expected by April 1, 2026)
Detection
Administrators should monitor for:
* Unexpected connections to port 23
* Suspicious network traffic during telnet protocol negotiation
* Unusual system behavior indicating potential compromise
Sources
https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html
https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html
https://securityaffairs.com/189620/hacking/researchers-warn-of-unpatched-critical-telnetd-flaw-affecting-all-versions.html
https://www.instagram.com/p/DWA58kkD-SY/
https://www.facebook.com/thehackernews/posts/%EF%B8%8F-warning-an-unpatched-critical-telnetd-bug-cve-2026-32746-lets-attackers-gain-f/1320184686812778/
https://x.com/RoryCrave/status/2034154699046162862
https://www.reddit.com/r/SecOpsDaily/comments/1rwvsxg/critical_unpatched_telnetd_flaw_cve202632746/

Comments