Research

CVE-2026-32746: Critical out-of-bounds write in GNU inetutils telnetd allows remote code execution

QuantNest Radar Team
QuantNest Radar Team
Author
Mar 15, 2026
7 min read
CVE-2026-32746: Critical out-of-bounds write in GNU inetutils telnetd allows remote code execution

A critical security vulnerability has been disclosed in the telnetd component of GNU inetutils, affecting all versions through 2.7. Tracked as CVE-2026-32746 and assigned a CVSS score of 9.8 (Critical), this flaw represents one of the most severe remotely-exploitable vulnerabilities disclosed this quarter.

Vulnerability Overview

The vulnerability is an out-of-bounds (OOB) write in the LINEMODE SLC (Set Local Characters) suboption handler of telnetd. The root cause lies in the add_slc() function, which fails to verify whether the internal buffer has reached capacity before writing additional data. An attacker can exploit this by sending specially crafted LINEMODE SLC suboption data to the Telnet service, overwriting adjacent memory and potentially achieving arbitrary code execution.

CVSS 3.1 Breakdown

The vulnerability received the highest possible severity ratings across all metrics:

  • Attack Vector: Network — exploitable remotely without physical access
  • Attack Complexity: Low — no special conditions or race windows required
  • Privileges Required: None — no authentication needed
  • User Interaction: None — fully automated exploitation possible
  • Confidentiality Impact: High — sensitive data exposure
  • Integrity Impact: High — arbitrary data modification
  • Availability Impact: High — complete denial of service

Technical Analysis

The add_slc() function within the telnetd LINEMODE implementation appends SLC (Set Local Characters) entries into a fixed-size buffer. However, the function does not perform any bounds checking prior to the write operation. When a malicious client sends an excessive number of SLC entries within a single LINEMODE negotiation sequence, the buffer overflows, corrupting adjacent stack or heap memory.

"The lack of a simple bounds check in add_slc() creates a textbook buffer overflow condition. Given that telnetd often runs with elevated privileges, the impact of successful exploitation is catastrophic." — QuantNest Radar Threat Research

Because the Telnet protocol operates in plaintext and the exploit requires zero authentication, any internet-exposed telnetd instance running GNU inetutils ≤ 2.7 is immediately at risk.

Affected Systems

The following environments are confirmed vulnerable:

  • Any Linux distribution shipping GNU inetutils through version 2.7 with telnetd enabled
  • Debian, Ubuntu, and derivative distributions using the inetutils-telnetd package
  • Embedded systems and IoT devices running legacy Telnet daemons based on GNU inetutils
  • Legacy infrastructure in healthcare, manufacturing, and government sectors still relying on Telnet for remote management

Remediation and Mitigation

Organizations should take immediate action to reduce their exposure:

  1. Patch immediately: Update GNU inetutils beyond version 2.7. Monitor your distribution's security advisory channels for the patched package release.
  2. Disable telnetd: If Telnet is not operationally critical, disable or remove the service immediately. Run systemctl stop telnet.socket && systemctl disable telnet.socket on systemd-based systems.
  3. Restrict network access: If telnetd must remain active, restrict access to port 23 using firewall rules (e.g., iptables or security groups), allowing connections only from trusted internal hosts.
  4. Migrate to SSH: Replace all Telnet usage with SSH, which provides encrypted communications and stronger authentication mechanisms.
  5. Monitor for exploitation: Watch for unusual LINEMODE SLC suboption negotiation patterns in network traffic captures and IDS/IPS logs. Anomalous bursts of SLC data to port 23 should trigger immediate investigation.

Indicators of Compromise

Security teams should monitor for the following anomalies:

  • Unusually large or malformed LINEMODE SLC suboption sequences in Telnet traffic
  • Unexpected crashes or segmentation faults in the telnetd process
  • Unauthorized process spawning or reverse shell connections originating from the telnetd parent process
  • Suspicious modifications to system files or creation of new user accounts following Telnet activity

QuantNest will continue tracking this vulnerability and update this advisory as vendor patches become available and additional exploitation intelligence emerges.