Critical Telnetd Flaw CVE-2026-32746 Enables Unauthenticated Root RCE via Port 23

Summary: Researchers have disclosed CVE-2026-32746, a critical flaw in GNU InetUtils telnetd that can allow an unauthenticated remote attacker to execute arbitrary code as root by exploiting a buffer overflow during Telnet option negotiation.

A critical vulnerability in the GNU InetUtils telnet daemon, tracked as CVE-2026-32746, could allow an unauthenticated attacker to execute arbitrary code with root privileges. According to The Hacker News, the issue is an out-of-bounds write in the LINEMODE Set Local Characters, or SLC, suboption handler that leads to a buffer overflow during the Telnet protocol handshake.

The flaw was discovered and reported by Israeli cybersecurity company Dream on March 11, 2026. Dream says the vulnerability affects all Telnet service implementations through version 2.7 and can be triggered before any login prompt appears. That means a remote attacker can connect directly to port 23 and send specially crafted protocol messages during option negotiation without needing valid credentials, user interaction or privileged network positioning.

Because telnetd typically runs with root privileges under inetd or xinetd deployments, successful exploitation can lead to full system compromise. Researchers warn that once root access is obtained, attackers could install persistent backdoors, exfiltrate data and use compromised machines as pivot points for lateral movement inside broader environments.

Dream says the bug can be exploited by sending a crafted SLC suboption containing many triplets, corrupting memory and enabling arbitrary writes that can be turned into remote code execution. The report adds that only a single connection to port 23 is needed to trigger the vulnerable code path.

At the time of disclosure, no patch had yet been released. Dream said a fix is expected no later than April 1, 2026. Until then, defenders are advised to disable Telnet if it is not required, avoid running telnetd as root when possible, block or tightly restrict access to port 23 and isolate any systems that still depend on Telnet for operational reasons.

The disclosure follows another critical GNU InetUtils telnetd issue, CVE-2026-24061, which was revealed earlier in 2026 and later came under active exploitation according to the U.S. Cybersecurity and Infrastructure Security Agency. Together, the two flaws highlight the continued risk of legacy remote access services that remain exposed in modern environments.

Key facts

  • CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd.
  • The vulnerability carries a CVSS score of 9.8.
  • The issue is an out-of-bounds write in the LINEMODE SLC suboption handler.
  • The bug can be triggered before authentication during Telnet option negotiation.
  • A single connection to port 23 is sufficient to reach the vulnerable code path.
  • The flaw affects GNU InetUtils telnetd through version 2.7.
  • Dream disclosed the issue on March 11, 2026 and said a fix is expected by April 1, 2026.

Why it matters

This matters because Telnet remains present in some legacy, industrial and embedded environments, and a pre-authentication root RCE in a service like telnetd creates an immediate path to full system compromise. Organizations that still rely on Telnet for compatibility or operational access may be carrying much higher risk than they assume.

Key metrics

  • CVSS score: 9.8 (severity reported by The Hacker News)
  • Affected versions: 2.7 and earlier (GNU InetUtils telnetd versions affected)
  • Required authentication: none (pre-auth exploitation over port 23)
  • Patch deadline stated by researchers: 2026-04-01 (expected availability of a fix)