Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/GNU%20InetUtils%20telnetd%20%E5%8F%82%E6%95%B0%E6%B3%A8%E5%85%A5%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2026-24061.md | POC Details |
| 2 | GNU Inetutils telnetd through 2.7 contains an authentication bypass caused by setting the USER environment variable to \"-f root\", letting remote attackers bypass authentication, exploit requires remote access to telnetd service. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2026/CVE-2026-24061.yaml | POC Details |
| 3 | https://github.com/vulhub/vulhub/blob/master/inetutils/CVE-2026-24061/README.md | POC Details | |
| 4 | A small docker lab to play with cve-2026-24061, the inetutils-telnetd authentication bypass. | https://github.com/leonjza/inetutils-telnetd-auth-bypass | POC Details |
| 5 | Bypass d’authentification Telnet menant à un accès root | https://github.com/duy-31/CVE-2026-24061---telnetd | POC Details |
| 6 | CVE-2026-24061 Batch Scanning Tool | https://github.com/TryA9ain/CVE-2026-24061 | POC Details |
| 7 | 基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具 | https://github.com/parameciumzhang/Tell-Me-Root | POC Details |
| 8 | None | https://github.com/Chocapikk/CVE-2026-24061 | POC Details |
| 9 | None | https://github.com/JayGLXR/CVE-2026-24061-POC | POC Details |
| 10 | GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。 | https://github.com/yanxinwu946/CVE-2026-24061--telnetd | POC Details |
| 11 | Exploitation of CVE-2026-24061 | https://github.com/SafeBreach-Labs/CVE-2026-24061 | POC Details |
| 12 | CVE-2026-24061 - Exploit | https://github.com/h3athen/CVE-2026-24061 | POC Details |
| 13 | None | https://github.com/xuemian168/CVE-2026-24061 | POC Details |
| 14 | CVE-2026-24061 漏洞检测工具 | https://github.com/monstertsl/CVE-2026-24061 | POC Details |
| 15 | CVE-2026-24061 环境 | https://github.com/r00tuser111/CVE-2026-24061 | POC Details |
| 16 | inetutils-telnetd Authentication Bypass - working | https://github.com/balgan/CVE-2026-24061 | POC Details |
| 17 | Proof of Concept: CVE-2026-24061 is a critical authentication bypass vulnerability in GNU inetutils-telnetd allowing unauthenticated remote attackers to gain instant root shell access via malicious NEW_ENVIRON telnet option exploitation. | https://github.com/SystemVll/CVE-2026-24061 | POC Details |
| 18 | None | https://github.com/z3n70/CVE-2026-24061 | POC Details |
| 19 | Nuclei template for CVE-2026-24061 | https://github.com/Mr-Zapi/CVE-2026-24061 | POC Details |
| 20 | GNU Inetutils telnetd Remote Authentication Bypass | https://github.com/midox008/CVE-2026-24061 | POC Details |
| 21 | None | https://github.com/BrainBob/CVE-2026-24061 | POC Details |
| 22 | None | https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061 | POC Details |
| 23 | CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards. | https://github.com/0p5cur/CVE-2026-24061-POC | POC Details |
| 24 | Docker setup for CVE-2026-24061 | https://github.com/shivam-bathla/CVE-2026-24061-setup | POC Details |
| 25 | CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypass | https://github.com/madfxr/Twenty-Three-Scanner | POC Details |
| 26 | CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing | https://github.com/Alter-N0X/CVE-2026-24061-POC | POC Details |
| 27 | GNU telnetd service from GNU InetUtils authentication-bypass | https://github.com/typeconfused/CVE-2026-24061 | POC Details |
| 28 | CVE-2026-24061 | https://github.com/Mefhika120/Ashwesker-CVE-2026-24061 | POC Details |
| 29 | CVE-2026-24061 PoC | https://github.com/infat0x/CVE-2026-24061 | POC Details |
| 30 | None | https://github.com/ms0x08-dev/CVE-2026-24061-POC | POC Details |
| 31 | None | https://github.com/punitdarji/telnetd-cve-2026-24061 | POC Details |
| 32 | CVE-2026-24061-Scanner by XsanLahci | https://github.com/XsanFlip/CVE-2026-24061-Scanner | POC Details |
| 33 | CVE-2026-24061 GNU Inetutils telnetd 身份验证绕过漏洞检测与利用 GUI 工具 | https://github.com/Lingzesec/CVE-2026-24061-GUI | POC Details |
| 34 | Vulnerability in GNU InetUtils telnetd Enables Remote Root Access | https://github.com/LucasPDiniz/CVE-2026-24061 | POC Details |
| 35 | None | https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root | POC Details |
| 36 | None | https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd | POC Details |
| 37 | Telnetd Auth Bypass Scanner (CVE-2026-24061) A Python-based scanner for detecting and exploiting the CVE-2026-24061 vulnerability in GNU Inetutils telnetd services. This tool scans IP addresses or networks for vulnerable telnetd services that allow authentication bypass leading to root shell access. | https://github.com/cumakurt/tscan | POC Details |
| 38 | Payload CVE-2026-24061 | https://github.com/novitahk/Exploit-CVE-2026-24061 | POC Details |
| 39 | Lab to show the CVE-2026-24061 | https://github.com/Gabs-hub/CVE-2026-24061_Lab | POC Details |
| 40 | GNU Inetutils telnet远程认证绕过漏洞(CVE-2026-24061),该漏洞源于 GNU Inetutils telnetd 组件中对环境变量处理不当,攻击者可利用该漏洞,通过构造恶意的 USER 环境变量并发送至受影响的 telnet 服务,触发认证绕过机制,进而实现无需密码直接获取root权限。 | https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061- | POC Details |
| 41 | Tell Me Root (Batch Scanning Tool for the CVE-2026-24061 Telnet Authentication Bypass) | https://github.com/hilwa24/CVE-2026-24061 | POC Details |
| 42 | CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows | https://github.com/0x7556/CVE-2026-24061 | POC Details |
| 43 | None | https://github.com/Parad0x7e/CVE-2026-24061 | POC Details |
| 44 | Checks for CVE-2026-24061 Telnetd exploit | https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester | POC Details |
| 45 | This is a simple PoC that allows you to highlight the severity of the ongoing and actively exploited Telnet bug that is going on right now. Why people are still using Telnet... beyond me. | https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061 | POC Details |
| 46 | Scanner for CVE-2026-24061 | https://github.com/buzz075/CVE-2026-24061 | POC Details |
| 47 | POC Script for CVE-2026-24061 (GNU Telnetd Exploit) | https://github.com/X-croot/CVE-2026-24061_POC | POC Details |
| 48 | Native Python Exploit & Mass Scanner for CVE-2026-24061 (GNU InetUtils Telnetd). Bypasses authentication via NEW-ENVIRON injection (USER=-f root) to get immediate root shell. Features parallel scanning (CIDR support) and robust result logging. | https://github.com/franckferman/CVE_2026_24061_PoC | POC Details |
| 49 | A docker image for CVE-2026-24061 in InetUtils telnetd. | https://github.com/SeptembersEND/CVE--2026-24061 | POC Details |
| 50 | CVE-2026-24061 PoC and walkthrough | https://github.com/ibrahmsql/CVE-2026-24061-PoC | POC Details |
| 51 | 🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication. | https://github.com/obrunolima1910/CVE-2026-24061 | POC Details |
| 52 | None | https://github.com/lavabyte/telnet-CVE-2026-24061 | POC Details |
| 53 | None | https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061 | POC Details |
| 54 | None | https://github.com/killsystema/scan-cve-2026-24061 | POC Details |
| 55 | A passive detection tool for identifying potential exposure to CVE-2026-24061 in GNU inetutils telnet installations | https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector | POC Details |
| 56 | CVE-2026-24061 PoC | https://github.com/scumfrog/cve-2026-24061 | POC Details |
| 57 | A lightweight Docker lab for experimenting with Telnet protocol negotiation, explained in the CVE-2026-24061 exploit, which contains automatic username injection using the NEW-ENVIRON option. | https://github.com/tiborscholtz/CVE-2026-24061 | POC Details |
| 58 | None | https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell- | POC Details |
No public POC found.
Login to generate AI POCNo comments yet