radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23

sourceThe Hacker News
calendar_todayMarch 18, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical Telnetd Flaw Enables Unauthenticated Root RCE

Summary

A critical security vulnerability in the GNU InetUtils telnet daemon (telnetd) has been identified, allowing unauthenticated remote attackers to execute arbitrary code with root privileges. The flaw, CVE-2026-32746, poses a significant threat due to its high CVSS score.

Key Points

  • The vulnerability is identified as CVE-2026-32746.
  • It affects the GNU InetUtils telnet daemon (telnetd).
  • The flaw allows unauthenticated remote code execution (RCE) with root privileges.
  • It is classified as an out-of-bounds write vulnerability in the LINEMODE Set.
  • The CVSS score assigned to this vulnerability is 9.8 out of 10.
  • The issue remains unpatched, increasing the risk of exploitation.

Analysis

The discovery of CVE-2026-32746 is significant due to its potential for remote code execution without authentication, which could lead to complete system compromise. The high CVSS score of 9.8 highlights the severity and urgency for mitigation. Given the widespread use of telnetd in various systems, this vulnerability poses a critical risk to affected infrastructures.

Conclusion

IT professionals should immediately assess their systems for the presence of the vulnerable telnetd service and consider disabling it until a patch is available. Monitoring for unusual activity on port 23 and implementing network segmentation can help mitigate potential exploitation.