Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Redhotcyber Banner Sito 970x120px Uscita 101125
Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

21 January 2026 18:23

A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass . A security researcher reported the vulnerability on January 19, 2026. Exploiting this flaw allows unauthenticated attackers to gain root access due to inadequate input handling in the telnetd authentication mechanism.

The security flaw arises from the specific method used by telnetd to invoke the login program. Telnetd, when a telnet client connects, accepts a USER environment variable sent by the remote client without any sanitization and transfers it directly to /usr/bin/login.

By sending a telnet connection with the specially crafted USER environment variable using the -a or -login telnet parameter, an attacker completely bypasses the login authentication system and immediately gains root access to the system. The vulnerability was introduced inadvertently during a code change on March 19, 2015 , and was included in version 1.9.3 of GNU InetUtils, released on May 12, 2015. The flaw persisted in all subsequent versions up to and including version 2.7.

The attacker has the ability to generate a malicious USER environment variable, including the specific string “-f root”, a parameter that login interprets as an indication to bypass standard authentication procedures.

GNU InetUtils versions 1.9.3 through 2.7 are vulnerable. According to OpenWall , organizations using telnetd from GNU InetUtils should immediately evaluate their exposure. GNU maintainers recommend three approaches: This vulnerability demonstrates the persistent risks associated with legacy protocols like Telnet.

Bypassing authentication allows complete system compromise with root privileges, which poses a critical security threat to any system that exposes telnetd to untrusted networks.

Organizations should prioritize updating GNU InetUtils or immediately disabling telnetd. The availability of patches means that a delayed fix significantly increases the risk of compromise.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.