Telnetd Flaw Lets Attackers Get Root Before Login Prompt
CVE-2026-32746 (CVSS 9.8) in GNU InetUtils telnetd enables unauthenticated root RCE via buffer overflow. FreeBSD, NetBSD, Citrix NetScaler affected.
A critical vulnerability in the GNU InetUtils telnetd implementation allows unauthenticated attackers to execute arbitrary code with root privileges—before the login prompt even appears. The flaw, tracked as CVE-2026-32746, carries a CVSS score of 9.8 and affects a surprisingly wide range of systems still running Telnet services.
Israeli cybersecurity firm Dream discovered and reported the vulnerability on March 11, 2026. The patch was expected to land by April 1, but organizations running affected systems should take immediate defensive action.
What Makes This Flaw So Dangerous
The vulnerability exists in the LINEMODE Set Local Characters (SLC) suboption handler. An out-of-bounds write in this handler triggers a buffer overflow, giving attackers a direct path to code execution. The attack requires nothing more than a network connection to port 23—no credentials, no authentication, no user interaction.
Because telnetd typically runs as root, successful exploitation grants attackers complete control over the target system. The attack happens during the initial connection handshake, meaning defenders have no opportunity to detect malicious login attempts.
Affected Systems
The flaw impacts GNU InetUtils telnetd through version 2.7, but the ripple effects extend far beyond Linux distributions. According to Dream's disclosure, affected software includes:
- FreeBSD and NetBSD
- Citrix NetScaler (concerning given recent NetScaler exploitation we covered)
- TrueNAS Core
- Haiku OS
- DragonFlyBSD
- uCLinux
- libmtev
Censys identified approximately 3,362 exposed hosts as of March 18. That number likely understates the true exposure, since many Telnet services sit behind corporate firewalls or on internal networks.
Why Telnet Still Exists
Security teams have been trying to kill Telnet for decades. The protocol transmits everything in plaintext, including credentials. SSH solved this problem in 1995. Yet Telnet persists in legacy environments, embedded systems, and network equipment that predates modern security practices.
The reality is messier than "just disable Telnet." Industrial control systems, older networking gear, and certain mainframe environments still depend on it. For organizations that can't immediately migrate away, this vulnerability creates an urgent problem.
Recommended Mitigations
Until patches are available and deployed:
- Disable telnetd entirely if your environment doesn't require it
- Block port 23 at your network perimeter and internal firewalls
- Run telnetd without root privileges if you must keep it running (reduces blast radius)
- Isolate Telnet access to specific network segments with strict access controls
- Monitor for exploitation attempts targeting port 23
Organizations running Citrix NetScaler should pay particular attention. NetScaler has been under heavy attack this year, and adding an unauthenticated RCE to the mix creates serious risk. We've seen multiple critical Citrix vulnerabilities exploited in rapid succession.
The Broader Lesson
This vulnerability highlights a persistent blind spot in enterprise security. Legacy protocols get forgotten until someone finds a way to weaponize them. Telnet services might not show up on modern asset inventories, but they're still running on equipment deployed years ago.
Security teams should treat this as a reminder to audit their environments for legacy services. If you haven't looked for Telnet recently, now is the time. The 3,362 exposed hosts Censys found represent the tip of the iceberg—the ones visible from the internet. Internal exposure is likely orders of magnitude larger.
For those managing infrastructure with Telnet dependencies, this is also an opportunity to push for migration. A CVSS 9.8 vulnerability requiring zero authentication tends to focus executive attention on technical debt.
What to Watch For
The patch timeline puts pressure on both GNU maintainers and downstream vendors. FreeBSD, NetBSD, and other affected projects need to integrate fixes and push updates to users. Citrix NetScaler customers should monitor for emergency patches.
Given the severity and the trivial exploitation requirements, proof-of-concept code will likely appear soon. Organizations with exposed Telnet services have a narrow window to harden their defenses before opportunistic scanning begins.
The security community has been saying "disable Telnet" for 30 years. This vulnerability demonstrates why that advice matters—and what happens when it goes unheeded.
Related Articles
GNU telnetd Flaw Grants Root Access Before Login Prompt
CVE-2026-32746 in GNU InetUtils telnetd allows unauthenticated root RCE via buffer overflow. CVSS 9.8, no patch available, over 200K servers exposed.
Mar 18, 2026Telegram Disputes Critical Zero-Click Sticker RCE Claim
Trend Micro ZDI disclosed a CVSS 9.8 flaw enabling device takeover via animated stickers. Telegram says the vulnerability doesn't exist. No patch until July 2026.
Mar 31, 2026Attackers Exploiting FortiClient EMS SQLi Flaw in the Wild
CVE-2026-21643 exploitation began March 26, six weeks after Fortinet's patch. Around 1,000 internet-exposed EMS instances remain vulnerable to unauthenticated RCE.
Mar 31, 2026n8n Merge Node Flaw Exposes 615K Instances to RCE
CVE-2026-33660 (CVSS 9.4) lets authenticated users escape n8n's AlaSQL sandbox via the Merge node. Over 615,000 public instances potentially vulnerable.
Mar 31, 2026