January 27 Advisory: GNU Inetutils Telnetd Remote Authentication Bypass [CVE-2026-24061]

Rapid Response

Vulnerability Description:

CVE-2026-24061 is a critical remote authentication bypass vulnerability in GNU Inetutils telnetd that allows unauthenticated attackers to gain root-level access to affected systems. The vulnerability stems from improper sanitization of the USER environment variable before passing it to the login(1) process. An attacker can craft a USER value of “-f root” to bypass authentication and automatically log in as the root user, resulting in remote code execution with full system privileges. The flaw has been present since version 1.9.3 (released May 12, 2015) and went undetected for approximately 11 years.

Screenshot-2026-01-27-at-3.45.31-PM.png
Map of exposed hosts

See the full breakdown by country in Censys Platform → 

FieldDescription
CVE-IDCVE-2026-24061 — CVSS score: 9.8 — assigned by MITRE
Vulnerability DescriptionA critical remote authentication bypass vulnerability in GNU Inetutils telnetd  allows unauthenticated attackers to gain root-level access to affected systems. An attacker can craft a USER value of “-f root” to bypass authentication and automatically log in as the root user, resulting in remote code execution with full system privileges. 
Date of DisclosureJanuary 21, 2026
Affected AssetsAny system running GNU Inetutils telnetd version 1.9.3 up to and including version 2.7 with the telnet daemon exposed to the network. Systems running telnetd from inetutils that allow login sessions via the login utility are at high risk. Notably, telnetd compiled with PAM or other hardening mechanisms may not be vulnerable depending on system configuration.
Vulnerable Software VersionsGNU Inetutils telnetd version 1.9.3 up to and including version 2.7
PoC AvailableYes. Multiple public proof-of-concept exploits are available demonstrating unauthenticated root login using USER=-f root via Telnet. The attack is simple and requires no special tools.
Exploitation StatusGreyNoise observed opportunistic scanning and exploitation attempts within hours of public disclosure, with attackers deploying post-exploitation payloads and system probes targeting embedded and poorly maintained Linux systems. Several honeypots have captured exploitation behavior attempting root logins via -f flag abuse.In total as of Monday, January 26, 2026 they have observed 183 distinct IPs targeting this vulnerability (source: GreyNoise)
Patch StatusA patch has been merged upstream in GNU Inetutils 2.8, and the issue was officially acknowledged in GNU’s bug tracker. Distributions such as DebianArch, and NixOS have issued updates. Users are advised to upgrade immediately to a patched version or disable telnetd entirely, especially if exposed to the internet.As a workaround, removing -f support from login(1) or firewalling Telnet services can help reduce exposure.

Censys Perspective 

At the time of writing, Censys observes 3,130 exposed hosts, trackable with the following queries: 

Platform:

host.services: (protocol: "TELNET" and banner=~"w+s+[0-9]+.[0-9]+(.[0-9]+)*(-[w-]+)?s+([^)]+)s+([^)]+)")

ASM:

host.services.telnet.banner: /.w+s+[0-9]+.[0-9]+./

Search:

services: (service_name= "TELNET" and banner:/.w+s+[0-9]+.[0-9]+./) 

Subscribe to our blog