Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-24061

CVSS 9.8 · Critical KEV EPSS 92.30% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-24061

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
参数注入或修改
Source: NVD (National Vulnerability Database)
Vulnerability Title
GNU Inetutils 参数注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GNU Inetutils是美国GNU社区的一组常见的网络程序。 GNU Inetutils 2.7及之前版本存在参数注入漏洞,该漏洞源于通过USER环境变量绕过远程身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
GNUInetutils 1.9.3 ~ 2.7 -

II. Public POCs for CVE-2026-24061

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/GNU%20InetUtils%20telnetd%20%E5%8F%82%E6%95%B0%E6%B3%A8%E5%85%A5%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2026-24061.mdPOC Details
2GNU Inetutils telnetd through 2.7 contains an authentication bypass caused by setting the USER environment variable to \"-f root\", letting remote attackers bypass authentication, exploit requires remote access to telnetd service. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2026/CVE-2026-24061.yamlPOC Details
3https://github.com/vulhub/vulhub/blob/master/inetutils/CVE-2026-24061/README.mdPOC Details
4A small docker lab to play with cve-2026-24061, the inetutils-telnetd authentication bypass.https://github.com/leonjza/inetutils-telnetd-auth-bypassPOC Details
5Bypass d’authentification Telnet menant à un accès roothttps://github.com/duy-31/CVE-2026-24061---telnetdPOC Details
6CVE-2026-24061 Batch Scanning Toolhttps://github.com/TryA9ain/CVE-2026-24061POC Details
7基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具https://github.com/parameciumzhang/Tell-Me-RootPOC Details
8Nonehttps://github.com/Chocapikk/CVE-2026-24061POC Details
9Nonehttps://github.com/JayGLXR/CVE-2026-24061-POCPOC Details
10GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。https://github.com/yanxinwu946/CVE-2026-24061--telnetdPOC Details
11Exploitation of CVE-2026-24061https://github.com/SafeBreach-Labs/CVE-2026-24061POC Details
12CVE-2026-24061 - Exploithttps://github.com/h3athen/CVE-2026-24061POC Details
13Nonehttps://github.com/xuemian168/CVE-2026-24061POC Details
14CVE-2026-24061 漏洞检测工具https://github.com/monstertsl/CVE-2026-24061POC Details
15CVE-2026-24061 环境https://github.com/r00tuser111/CVE-2026-24061POC Details
16inetutils-telnetd Authentication Bypass - workinghttps://github.com/balgan/CVE-2026-24061POC Details
17Proof of Concept: CVE-2026-24061 is a critical authentication bypass vulnerability in GNU inetutils-telnetd allowing unauthenticated remote attackers to gain instant root shell access via malicious NEW_ENVIRON telnet option exploitation.https://github.com/SystemVll/CVE-2026-24061POC Details
18Nonehttps://github.com/z3n70/CVE-2026-24061POC Details
19Nuclei template for CVE-2026-24061https://github.com/Mr-Zapi/CVE-2026-24061POC Details
20GNU Inetutils telnetd Remote Authentication Bypasshttps://github.com/midox008/CVE-2026-24061POC Details
21Nonehttps://github.com/BrainBob/CVE-2026-24061POC Details
22Nonehttps://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061POC Details
23CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards.https://github.com/0p5cur/CVE-2026-24061-POCPOC Details
24Docker setup for CVE-2026-24061https://github.com/shivam-bathla/CVE-2026-24061-setupPOC Details
25CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypasshttps://github.com/madfxr/Twenty-Three-ScannerPOC Details
26CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing https://github.com/Alter-N0X/CVE-2026-24061-POCPOC Details
27GNU telnetd service from GNU InetUtils authentication-bypasshttps://github.com/typeconfused/CVE-2026-24061POC Details
28CVE-2026-24061https://github.com/Mefhika120/Ashwesker-CVE-2026-24061POC Details
29CVE-2026-24061 PoChttps://github.com/infat0x/CVE-2026-24061POC Details
30Nonehttps://github.com/ms0x08-dev/CVE-2026-24061-POCPOC Details
31Nonehttps://github.com/punitdarji/telnetd-cve-2026-24061POC Details
32CVE-2026-24061-Scanner by XsanLahcihttps://github.com/XsanFlip/CVE-2026-24061-ScannerPOC Details
33CVE-2026-24061 GNU Inetutils telnetd 身份验证绕过漏洞检测与利用 GUI 工具https://github.com/Lingzesec/CVE-2026-24061-GUIPOC Details
34Vulnerability in GNU InetUtils telnetd Enables Remote Root Accesshttps://github.com/LucasPDiniz/CVE-2026-24061POC Details
35Nonehttps://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2rootPOC Details
36Nonehttps://github.com/androidteacher/CVE-2026-24061-PoC-TelnetdPOC Details
37Telnetd Auth Bypass Scanner (CVE-2026-24061) A Python-based scanner for detecting and exploiting the CVE-2026-24061 vulnerability in GNU Inetutils telnetd services. This tool scans IP addresses or networks for vulnerable telnetd services that allow authentication bypass leading to root shell access.https://github.com/cumakurt/tscanPOC Details
38Payload CVE-2026-24061https://github.com/novitahk/Exploit-CVE-2026-24061POC Details
39Lab to show the CVE-2026-24061https://github.com/Gabs-hub/CVE-2026-24061_LabPOC Details
40GNU Inetutils telnet远程认证绕过漏洞(CVE-2026-24061),该漏洞源于 GNU Inetutils telnetd 组件中对环境变量处理不当,攻击者可利用该漏洞,通过构造恶意的 USER 环境变量并发送至受影响的 telnet 服务,触发认证绕过机制,进而实现无需密码直接获取root权限。https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-POC Details
41Tell Me Root (Batch Scanning Tool for the CVE-2026-24061 Telnet Authentication Bypass)https://github.com/hilwa24/CVE-2026-24061POC Details
42CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windowshttps://github.com/0x7556/CVE-2026-24061POC Details
43Nonehttps://github.com/Parad0x7e/CVE-2026-24061POC Details
44Checks for CVE-2026-24061 Telnetd exploithttps://github.com/dotelpenguin/telnetd_CVE-2026-24061_testerPOC Details
45This is a simple PoC that allows you to highlight the severity of the ongoing and actively exploited Telnet bug that is going on right now. Why people are still using Telnet... beyond me.https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061POC Details
46Scanner for CVE-2026-24061https://github.com/buzz075/CVE-2026-24061POC Details
47POC Script for CVE-2026-24061 (GNU Telnetd Exploit) https://github.com/X-croot/CVE-2026-24061_POCPOC Details
48Native Python Exploit & Mass Scanner for CVE-2026-24061 (GNU InetUtils Telnetd). Bypasses authentication via NEW-ENVIRON injection (USER=-f root) to get immediate root shell. Features parallel scanning (CIDR support) and robust result logging.https://github.com/franckferman/CVE_2026_24061_PoCPOC Details
49A docker image for CVE-2026-24061 in InetUtils telnetd.https://github.com/SeptembersEND/CVE--2026-24061POC Details
50CVE-2026-24061 PoC and walkthroughhttps://github.com/ibrahmsql/CVE-2026-24061-PoCPOC Details
51🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.https://github.com/obrunolima1910/CVE-2026-24061POC Details
52Nonehttps://github.com/lavabyte/telnet-CVE-2026-24061POC Details
53Nonehttps://github.com/canpilayda/inetutils-telnetd-cve-2026-24061POC Details
54Nonehttps://github.com/killsystema/scan-cve-2026-24061POC Details
55A passive detection tool for identifying potential exposure to CVE-2026-24061 in GNU inetutils telnet installationshttps://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-DetectorPOC Details
56CVE-2026-24061 PoChttps://github.com/scumfrog/cve-2026-24061POC Details
57A lightweight Docker lab for experimenting with Telnet protocol negotiation, explained in the CVE-2026-24061 exploit, which contains automatic username injection using the NEW-ENVIRON option.https://github.com/tiborscholtz/CVE-2026-24061POC Details
58Nonehttps://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-24061

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-24061

No comments yet


Leave a comment