telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
References
Configurations
History
11 Feb 2026, 15:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.vicarius.io/vsociety/posts/cve-2026-24061-detection-script-remote-authentication-bypass-in-gnu-inetutils-package - Third Party Advisory | |
| References | () https://www.vicarius.io/vsociety/posts/cve-2026-24061-mitigation-script-remote-authentication-bypass-in-gnu-inetutils-package - Mitigation, Third Party Advisory |
10 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Jan 2026, 13:28
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc - Patch | |
| References | () https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b - Patch | |
| References | () https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html - Mitigation, Vendor Advisory |
29 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jan 2026, 16:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| References | () https://www.gnu.org/software/inetutils/ - Product | |
| References | () https://www.openwall.com/lists/oss-security/2026/01/20/2 - Mailing List | |
| References | () https://www.openwall.com/lists/oss-security/2026/01/20/8 - Mailing List | |
| References | () http://www.openwall.com/lists/oss-security/2026/01/22/1 - Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2026/01/msg00025.html - Mailing List, Third Party Advisory | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-24061 - US Government Resource | |
| References | () https://www.labs.greynoise.io/grimoire/2026-01-22-f-around-and-find-out-18-hours-of-unsolicited-houseguests/index.html - Exploit, Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2026/01/20/2#:~:text=root@...a%3A~%20USER=' - Mailing List, Third Party Advisory | |
| First Time |
Debian debian Linux
Gnu Debian Gnu inetutils |
26 Jan 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jan 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
21 Jan 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 07:16
Updated : 2026-02-11 15:40
NVD link : CVE-2026-24061
Mitre link : CVE-2026-24061
CVE.ORG link : CVE-2026-24061
JSON object : View
Products Affected
debian
- debian_linux
gnu
- inetutils
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
