nomisec
WORKING POC
191 stars
by SafeBreach-Labs · remote
https://github.com/SafeBreach-Labs/CVE-2026-24061
This PoC exploits CVE-2026-24061 by sending a malformed USER environment variable via Telnet's NEW-ENVIRON option to achieve remote code execution. It handles Telnet protocol negotiation and subnegotiation to inject the payload.
Classification
Working Poc 95%
Target:
Telnet servers supporting NEW-ENVIRON option (version not specified)
No auth needed
Prerequisites:
Network access to vulnerable Telnet server · Telnet server with NEW-ENVIRON option enabled
nomisec
WORKING POC
61 stars
by JayGLXR · remote
https://github.com/JayGLXR/CVE-2026-24061-POC
This PoC exploits CVE-2026-24061, an authentication bypass in GNU inetutils-telnetd via the NEW_ENVIRON telnet option. It sends a crafted USER environment variable to gain a root shell without credentials.
Classification
Working Poc 95%
Target:
GNU inetutils-telnetd versions prior to 2.6
No auth needed
Prerequisites:
Network access to the target telnet service · Telnet service running on the target
nomisec
WORKING POC
18 stars
by parameciumzhang · remote
https://github.com/parameciumzhang/Tell-Me-Root
This repository contains a Python-based batch scanner and exploit tool for CVE-2026-24061, a Telnet authentication bypass vulnerability. It automates connectivity checks and payload delivery to gain root access via Telnet.
Classification
Working Poc 95%
Target:
Telnet service (version not specified)
No auth needed
Prerequisites:
Python 3.6+ · pexpect library · list of target IPs/ports
nomisec
WORKING POC
12 stars
by Lingzesec · poc
https://github.com/Lingzesec/CVE-2026-24061-GUI
This repository contains a GUI tool for detecting and exploiting CVE-2026-24061, an authentication bypass vulnerability in GNU Inetutils telnetd that allows root access without credentials. The tool includes scanning and exploitation capabilities with a modern UI.
Classification
Working Poc 95%
Target:
GNU Inetutils telnetd
No auth needed
Prerequisites:
Network access to the target system · Telnet service running on the target
github
SCANNER
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-24061
The repository contains a Python-based scanner for detecting CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils Telnetd. The scanner supports multi-threaded scanning, flexible target input, and detailed logging but does not include exploit code.
Classification
Scanner 95%
Target:
GNU InetUtils Telnetd >=1.9.3 <=2.7
No auth needed
Prerequisites:
network access to target telnet service · Python 3.x
nomisec
WORKING POC
7 stars
by h3athen · remote
https://github.com/h3athen/CVE-2026-24061
This exploit leverages Telnet protocol negotiation to inject a malicious NEW_ENVIRON option, allowing arbitrary command execution via the USER variable. It demonstrates a remote code execution (RCE) vulnerability in a Telnet service.
Classification
Working Poc 90%
Target:
Telnet service (version unspecified)
No auth needed
Prerequisites:
Network access to the target Telnet service
nomisec
SCANNER
6 stars
by TryA9ain · poc
https://github.com/TryA9ain/CVE-2026-24061
This repository contains a Python-based scanner for CVE-2026-24061, which targets an authentication bypass vulnerability in GNU Inetutils telnetd. The scanner checks for vulnerable telnetd instances by sending crafted environment variables and analyzing responses.
Classification
Scanner 95%
Target:
GNU Inetutils telnetd
No auth needed
Prerequisites:
Network access to the target telnetd service · Telnet service running on the target
nomisec
WORKING POC
6 stars
by leonjza · poc
https://github.com/leonjza/inetutils-telnetd-auth-bypass
This repository provides a Docker-based lab to exploit CVE-2026-24061, an authentication bypass in inetutils-telnetd versions 1.9.3 to 2.7. The exploit leverages a command injection via the USER environment variable to bypass authentication and gain root access.
Classification
Working Poc 95%
Target:
inetutils-telnetd 1.9.3 - 2.7
No auth needed
Prerequisites:
Docker environment · Vulnerable inetutils-telnetd version
nomisec
WORKING POC
5 stars
by SystemVll · remote
https://github.com/SystemVll/CVE-2026-24061
This repository contains a functional exploit for CVE-2026-24061, a critical authentication bypass vulnerability in GNU inetutils-telnetd. The exploit leverages improper validation of the USER environment variable in the NEW_ENVIRON telnet option to gain root shell access without authentication.
Classification
Working Poc 95%
Target:
GNU inetutils-telnetd <= 2.7
No auth needed
Prerequisites:
Network access to target telnetd service · Python 3.7 or higher
nomisec
WORKING POC
5 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2026-24061
This repository contains a working Go-based PoC for CVE-2026-24061, an authentication bypass vulnerability in GNU Inetutils telnetd. The exploit leverages the NEW-ENVIRON telnet option to inject a malicious USER variable, bypassing authentication and granting root shell access.
Classification
Working Poc 100%
Target:
GNU Inetutils telnetd 1.9.3 - 2.7
No auth needed
Prerequisites:
Network access to the vulnerable telnetd service · Telnet service running on the target
nomisec
WORKING POC
3 stars
by ibrahmsql · remote
https://github.com/ibrahmsql/CVE-2026-24061-PoC
This PoC exploits an authentication bypass in GNU Inetutils telnetd by injecting the USER environment variable with '-f root' via Telnet's NEW_ENVIRON option, granting root shell access without authentication.
Classification
Working Poc 95%
Target:
GNU Inetutils telnetd ≤ 2.7
No auth needed
Prerequisites:
Network access to vulnerable telnetd service · Telnet service running on target
nomisec
WORKING POC
3 stars
by yanxinwu946 · poc
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
This repository contains a proof-of-concept exploit and scanner for CVE-2026-24061, an authentication bypass vulnerability in inetutils-telnetd. The exploit leverages the `USER` environment variable to bypass authentication and gain a root shell.
Classification
Working Poc 95%
Target:
inetutils-telnetd
No auth needed
Prerequisites:
Network access to the telnet service · telnet client installed on the attacker's machine
nomisec
WORKING POC
3 stars
by shivam-bathla · poc
https://github.com/shivam-bathla/CVE-2026-24061-setup
This repository provides a Docker-based vulnerable environment for CVE-2026-24061, a Telnet authentication bypass vulnerability. The setup allows an attacker to gain a root shell by exploiting the misconfigured Telnet service.
Classification
Working Poc 95%
Target:
Telnet (inetutils-telnetd)
No auth needed
Prerequisites:
Docker installed · Network access to the vulnerable container
nomisec
WORKING POC
2 stars
by RStephanH · poc
https://github.com/RStephanH/vuln-deb
This repository provides a functional exploit PoC for CVE-2026-24061, an authentication bypass in GNU InetUtils telnetd. It includes a Vagrant VM setup with a vulnerable environment and a clear exploit command to achieve root access via Telnet.
Classification
Working Poc 100%
Target:
GNU InetUtils telnetd 1.9.3 – 2.7
No auth needed
Prerequisites:
Vagrant · VirtualBox · host machine with network access
nomisec
WORKING POC
2 stars
by 0p5cur · poc
https://github.com/0p5cur/CVE-2026-24061-POC
This repository contains a functional PoC for CVE-2026-24061, an authentication bypass vulnerability in telnetd. The exploit leverages improper handling of the USER environment variable to bypass authentication and achieve RCE as root.
Classification
Working Poc 95%
Target:
telnetd versions 1.9.3 to 2.7
No auth needed
Prerequisites:
Network access to target telnet service · Affected telnetd version
nomisec
SCANNER
2 stars
by duy-31 · remote
https://github.com/duy-31/CVE-2026-24061---telnetd
This repository contains a Python-based scanner for CVE-2026-24061, an authentication bypass vulnerability in certain telnetd implementations. The script checks for vulnerable systems by attempting to exploit the NEW-ENVIRON telnet option to bypass authentication and execute commands.
Classification
Scanner 90%
Target:
telnetd (specific versions not specified)
No auth needed
Prerequisites:
Network access to the target telnet service · Telnet service exposed on the target
nomisec
WORKING POC
1 stars
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2026-24061
The repository contains a functional exploit for CVE-2026-24061, a critical remote authentication bypass in GNU Inetutils telnetd. The exploit leverages the NEW-ENVIRON Telnet option to inject a malicious USER environment variable, bypassing authentication and granting a root shell.
Classification
Working Poc 100%
Target:
GNU Inetutils telnetd ≤ 2.7
No auth needed
Prerequisites:
Network access to TCP/23 · Vulnerable version of GNU Inetutils telnetd
nomisec
WORKING POC
1 stars
by franckferman · remote
https://github.com/franckferman/CVE_2026_24061_PoC
This repository contains a Python-based multithreaded scanner and exploit for CVE-2026-24061, which targets a vulnerability in GNU InetUtils (telnetd). The exploit injects the `USER` environment variable with the value `-f root` during the Telnet protocol handshake to gain a root shell.
Classification
Working Poc | Scanner 95%
Attack Type
Rce | Auth Bypass
Target:
GNU InetUtils (telnetd)
No auth needed
Prerequisites:
Network access to the target telnet service · Telnet service running on the target
nomisec
STUB
1 stars
by X-croot · remote
https://github.com/X-croot/CVE-2026-24061_POC
The repository claims to be a PoC for CVE-2026-24061 targeting GNU Telnetd for RCE but only contains a basic telnet connection script without any exploit logic. The script merely establishes a telnet session with provided credentials.
Target:
GNU Telnetd (version unspecified)
Auth required
Prerequisites:
telnet client installed · target IP address · valid credentials (default: root)
nomisec
SCANNER
1 stars
by madfxr · poc
https://github.com/madfxr/Twenty-Three-Scanner
This repository contains a scanner for detecting vulnerable Telnetd services affected by CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils. The scanner is written in Python and supports multi-threaded scanning with various input options.
Classification
Scanner 95%
Target:
GNU InetUtils Telnetd >=1.9.3 <=2.7
No auth needed
Prerequisites:
Network access to the target Telnetd service · Python 3.x environment
github
WORKING POC
1 stars
by ridpath · pythonremote
https://github.com/ridpath/Terrminus-CVE-2026-2406
Terminus is a Python-based exploit framework for CVE-2026-24061, a Telnet authentication bypass vulnerability. It includes a scanner, protocol engine, and exploitation module for RFC 1572 NEW_ENVIRON abuse.
Classification
Working Poc 95%
Target:
Telnet services supporting RFC 1572 (e.g., GNU Inetutils telnetd <= 2.7)
No auth needed
Prerequisites:
Network access to vulnerable Telnet service (port 23) · Telnet service with RFC 1572 NEW_ENVIRON support
nomisec
SCANNER
1 stars
by dotelpenguin · remote
https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
This repository contains a Python-based scanner to detect CVE-2026-24061, a vulnerability in telnetd servers that improperly handle environment variables via the NEW-ENVIRON telnet option. The script tests for potential command injection or authentication bypass by sending crafted environment variables and analyzing server responses.
Classification
Scanner 90%
Target:
telnetd servers supporting NEW-ENVIRON option
No auth needed
Prerequisites:
Network access to target telnet server · Python 3.x
nomisec
WORKING POC
1 stars
by FurkanKAYAPINAR · remote
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
This repository contains a functional exploit and scanner for CVE-2026-24061, which leverages improper handling of the `NEW-ENVIRON` Telnet option in `inetutils-telnetd` to achieve remote pre-authentication root access via the `-f root` payload.
Classification
Working Poc 95%
Target:
inetutils-telnetd (and potentially other Telnet implementations)
No auth needed
Prerequisites:
Network access to the target Telnet service · Telnet service running on a vulnerable version
nomisec
WORKING POC
1 stars
by infat0x · remote
https://github.com/infat0x/CVE-2026-24061
This is a functional PoC exploit for CVE-2026-24061, targeting a Telnet NEW-ENVIRON authentication bypass vulnerability. It establishes a connection to a vulnerable Telnet service and injects a payload (`USER=-f root`) to bypass authentication.
Classification
Working Poc 95%
Target:
Telnet service with NEW-ENVIRON support
No auth needed
Prerequisites:
Network access to the target Telnet service · Telnet service with NEW-ENVIRON option enabled
nomisec
WORKING POC
1 stars
by balgan · remote
https://github.com/balgan/CVE-2026-24061
This is a functional proof-of-concept exploit for CVE-2026-24061, an authentication bypass vulnerability in GNU inetutils-telnetd. It leverages the TELNET NEW-ENVIRON option to inject a malicious USER variable, bypassing authentication and granting a root shell.
Classification
Working Poc 95%
Target:
GNU inetutils-telnetd versions 1.9.3 through 2.7
No auth needed
Prerequisites:
Network access to the target's telnet service (port 23 by default) · Vulnerable version of inetutils-telnetd running on the target
nomisec
WORKING POC
1 stars
by xuemian168 · poc
https://github.com/xuemian168/CVE-2026-24061
This repository provides a Dockerized test environment for CVE-2026-24061, which targets a vulnerability in GNU InetUtils 2.0's telnetd service. The setup includes a vulnerable telnetd service configured via xinetd, allowing researchers to test exploitation scenarios in an isolated environment.
Classification
Working Poc 95%
Target:
GNU InetUtils 2.0 (telnetd)
No auth needed
Prerequisites:
Docker environment · Network access to the exposed telnet port
nomisec
WRITEUP
by Risma2025 · poc
https://github.com/Risma2025/CVE-2026-24061-GNU-InetUtils-telnetd-Authentication-Bypass-Vulnerability
This repository provides a detailed technical analysis of CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils telnetd. It includes a timeline of exploitation, MITRE ATT&CK mapping, and indicators of compromise (IOCs) derived from a PCAP file analysis.
Classification
Writeup 95%
Target:
GNU InetUtils telnetd
No auth needed
Prerequisites:
Access to a vulnerable telnetd service · Ability to send crafted Telnet NEW-ENVIRON option
nomisec
WORKING POC
by athack-ctf · poc
https://github.com/athack-ctf/chall2026-telneted
This repository contains a functional exploit for CVE-2026-24061, leveraging a vulnerability in telnetd to escalate privileges by manipulating the USER environment variable to switch to another user (borg) and access restricted files.
Classification
Working Poc 95%
Target:
inetutils-telnetd 2:2.5-3ubuntu4
Auth required
Prerequisites:
telnet access · valid credentials for initial user (astrax)
nomisec
WORKING POC
by ekomsSavior · remote
https://github.com/ekomsSavior/telnet_scan
This repository contains a functional Python-based exploit for CVE-2026-24061, which allows authentication bypass in GNU InetUtils telnetd via USER environment variable injection, leading to an interactive root shell. It also includes detection for CVE-2026-32746, a pre-authentication buffer overflow in the LINEMODE SLC handler.
Classification
Working Poc 95%
Target:
GNU InetUtils telnetd
No auth needed
Prerequisites:
Network access to the target telnet service (TCP/23) · Vulnerable version of GNU InetUtils telnetd
nomisec
WORKING POC
by przemytn · remote
https://github.com/przemytn/CVE-2026-24061
This repository contains a functional exploit for CVE-2026-24061, an argument injection vulnerability in GNU InetUtils telnetd. The exploit leverages the NEW-ENVIRON feature to inject a malicious USER variable, bypassing authentication and gaining root access via the login command.
Classification
Working Poc 100%
Target:
GNU InetUtils telnetd versions 1.9.3 to 2.7
No auth needed
Prerequisites:
Target must be running a vulnerable version of GNU InetUtils telnetd · Telnet service must be accessible on port 23
nomisec
SCANNER
by HD0x01 · poc
https://github.com/HD0x01/CVE-2026-24061-NSE
This repository contains an Nmap NSE script designed to detect CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils telnetd. The script performs a full Telnet negotiation and checks for the presence of a shell prompt without a password challenge.
Classification
Scanner 100%
Target:
GNU InetUtils telnetd 1.9.3 through 2.7
No auth needed
Prerequisites:
Telnet service running on target · Network access to port 23
gitlab
WORKING POC
by BlacklineOps · poc
https://gitlab.com/BlacklineOps/cve-2026-24061-poc
This repository contains a functional Python exploit for CVE-2026-24061, which bypasses authentication in GNU InetUtils telnetd by injecting a malicious USER environment variable via the Telnet NEW_ENVIRON option, resulting in unauthenticated root access.
Classification
Working Poc 100%
Target:
GNU InetUtils telnetd versions 1.9.3 through 2.7
No auth needed
Prerequisites:
Network access to TCP port 23 on the target
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2026-24061
The repository contains a functional exploit for CVE-2026-24061, a critical remote authentication bypass in GNU Inetutils telnetd. The exploit leverages the NEW-ENVIRON Telnet option to inject a malicious USER environment variable, bypassing authentication and granting a root shell.
Classification
Working Poc 100%
Target:
GNU Inetutils telnetd ≤ 2.7
No auth needed
Prerequisites:
Network access to TCP/23 · Vulnerable version of GNU Inetutils telnetd
nomisec
STUB
by Remnant-DB · poc
https://github.com/Remnant-DB/CVE-2026-24061
This repository provides a containerized lab environment for CVE-2026-24061 but does not include any exploit code or technical details about the vulnerability itself. It sets up a telnet service on port 2323, likely as a placeholder for further testing.
Target:
Remnant-DB (version unspecified)
No auth needed
Prerequisites:
Docker or Podman · network access to the container
nomisec
WORKING POC
by setuju · poc
https://github.com/setuju/telnetd
This Perl script exploits CVE-2026-24061 by sending a crafted Telnet payload to trigger a vulnerability in the telnetd service, likely achieving remote code execution (RCE) via improper handling of Telnet option negotiation. The exploit forks processes to handle bidirectional communication, indicating an interactive shell may be obtained.
Classification
Working Poc 95%
Target:
telnetd (version unspecified)
No auth needed
Prerequisites:
network access to target telnetd service (default port 23)
github
WORKING POC
by mbanyamer · poc
https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
This repository contains a functional Python exploit for CVE-2026-24061, which bypasses authentication in GNU Inetutils telnetd by manipulating the USER environment variable via Telnet NEW-ENVIRON negotiation to execute '/bin/login -f root', resulting in an immediate root shell.
Classification
Working Poc 100%
Target:
GNU Inetutils telnetd ≤ 2.7
No auth needed
Prerequisites:
Target running vulnerable GNU Inetutils telnetd ≤ 2.7 · Telnet service reachable on TCP/23
nomisec
WORKING POC
by obrunolima1910 · remote
https://github.com/obrunolima1910/CVE-2026-24061
This repository contains a functional exploit for CVE-2026-24061, targeting a critical authentication bypass in GNU inetutils-telnetd via the NEW_ENVIRON telnet option. The exploit sends a crafted payload to achieve unauthenticated root access.
Classification
Working Poc 95%
Target:
GNU inetutils-telnetd (affected versions)
No auth needed
Prerequisites:
Network access to the target telnet service (port 23) · Target running vulnerable GNU inetutils-telnetd
nomisec
WORKING POC
by tiborscholtz · remote
https://github.com/tiborscholtz/CVE-2026-24061
This PoC exploits CVE-2026-24061 by leveraging Telnet protocol negotiation to inject a USER environment variable, potentially bypassing authentication. It includes an interactive Telnet client with auto-login fallback for environments where NEW-ENVIRON is not supported.
Classification
Working Poc 95%
Target:
inetutils-telnetd 2.7
No auth needed
Prerequisites:
Docker environment · Telnet server with NEW-ENVIRON support · USER environment variable set
nomisec
WORKING POC
by scumfrog · remote
https://github.com/scumfrog/cve-2026-24061
This PoC exploits CVE-2026-24061, an argument injection vulnerability in GNU InetUtils telnetd (versions 1.9.3 to 2.7). It bypasses authentication by injecting '-f root' via the NEW_ENVIRON USER variable during telnet negotiation, leading to a remote root shell without authentication.
Classification
Working Poc 95%
Target:
GNU InetUtils telnetd 1.9.3 to 2.7
No auth needed
Prerequisites:
Network access to the target telnet service · Telnet service running on the target
nomisec
SCANNER
by nrnw · poc
https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector
This repository contains a passive detection tool for CVE-2026-24061, a vulnerability in GNU inetutils telnet versions 1.9.3 to 2.7. The tool checks for the presence of telnet, identifies the implementation, and flags vulnerable versions without exploiting the vulnerability.
Classification
Scanner 100%
Target:
GNU inetutils telnet versions 1.9.3 to 2.7
No auth needed
Prerequisites:
Presence of telnet binary on the system
nomisec
WORKING POC
by killsystema · poc
https://github.com/killsystema/scan-cve-2026-24061
This repository contains a scanner for CVE-2026-24061, an authentication bypass vulnerability in GNU inetutils telnetd ≤ 2.7. The scanner checks for vulnerable systems by sending crafted payloads to exploit the flaw and verify root access.
Classification
Working Poc | Scanner 95%
Target:
GNU inetutils telnetd ≤ 2.7
No auth needed
Prerequisites:
Network access to the target system · Telnet service exposed on port 23
nomisec
WRITEUP
by canpilayda · poc
https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061
This repository contains a writeup documenting an authentication bypass vulnerability (CVE-2026-24061) in GNU Inetutils telnetd. The author describes their walkthrough using Hackviser's lab environment but does not provide exploit code.
Classification
Writeup 90%
Target:
GNU Inetutils telnetd
No auth needed
Prerequisites:
Access to a vulnerable GNU Inetutils telnetd instance
nomisec
WRITEUP
by lavabyte · poc
https://github.com/lavabyte/telnet-CVE-2026-24061
This repository contains a README.md file referencing a Python script for CVE-2026-24061, which appears to be a Telnet RCE vulnerability. The README outlines tasks such as understanding the code, modifying it for compatibility, and adding a GUI using simple-term-menu.
Classification
Writeup 80%
Target:
Telnet (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Telnet service
nomisec
WRITEUP
by SeptembersEND · poc
https://github.com/SeptembersEND/CVE--2026-24061
This repository is a README file referencing CVE-2026-24061, providing links to the NVD entry, related Docker images, software sources, and another PoC repository. It does not contain exploit code or technical details.
Classification
Writeup 90%
Target:
unknown
No auth needed
nomisec
WRITEUP
by buzz075 · poc
https://github.com/buzz075/CVE-2026-24061
This repository contains a detailed technical analysis of CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils telnetd. The vulnerability allows unauthenticated attackers to gain root access by injecting malicious values into the USER environment variable, which is passed unsanitized to the login command.
Classification
Writeup 100%
Target:
GNU InetUtils telnetd 1.9.3 through 2.7
No auth needed
Prerequisites:
Network access to the target system's telnet service (port 23) · GNU InetUtils telnetd version 1.9.3 through 2.7
nomisec
WORKING POC
by 0xXyc · remote
https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061
This repository contains a Docker-based proof-of-concept for CVE-2026-24061, an authentication bypass vulnerability in GNU inetutils-telnetd. The exploit leverages the `-f` flag in `/usr/bin/login` to bypass authentication by injecting it via the `USER` environment variable.
Classification
Working Poc 100%
Target:
GNU inetutils-telnetd versions 1.9.3 through 2.7
No auth needed
Prerequisites:
Docker environment · Vulnerable version of GNU inetutils-telnetd
nomisec
WORKING POC
by Parad0x7e · remote
https://github.com/Parad0x7e/CVE-2026-24061
This repository contains a Go-based exploit for CVE-2026-24061, an authentication bypass vulnerability in telnetd (inetutils). The exploit leverages the `-a` option and a malformed `USER` environment variable to bypass authentication and obtain a root shell.
Classification
Working Poc 95%
Target:
telnetd (inetutils)
No auth needed
Prerequisites:
Network access to the telnetd service · telnetd running with vulnerable version
nomisec
WRITEUP
by 0x7556 · poc
https://github.com/0x7556/CVE-2026-24061
This repository contains a README describing a supposed RCE exploit for CVE-2026-24061 affecting GNU Inetutils Telnet versions 1.9.3 to 2.7. However, no actual exploit code is provided, only screenshots and usage instructions.
Classification
Writeup 30%
Target:
GNU Inetutils Telnet 1.9.3 <= version <= 2.7
No auth needed
Prerequisites:
network access to target telnet service
nomisec
WORKING POC
by hilwa24 · poc
https://github.com/hilwa24/CVE-2026-24061
This is a Python-based exploit for CVE-2026-24061, which automates the scanning and exploitation of a Telnet authentication bypass vulnerability. It uses pexpect to interact with Telnet sessions and provides an interactive shell upon successful exploitation.
Classification
Working Poc 90%
Target:
Telnet service (version not specified)
No auth needed
Prerequisites:
Python 3.8+ · pexpect library · list of target IPs/ports
nomisec
SCANNER
by MY0723 · poc
https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
This repository provides a detection tool for CVE-2026-24061, an authentication bypass vulnerability in GNU Inetutils Telnetd. The tool checks for uid=0/gid=0 patterns to identify potential exploitation of environment variable injection.
Classification
Scanner 90%
Target:
GNU Inetutils Telnetd 1.9.3 - 2.7
No auth needed
Prerequisites:
Network access to target · Target running vulnerable GNU Inetutils Telnetd
nomisec
WORKING POC
by Gabs-hub · poc
https://github.com/Gabs-hub/CVE-2026-24061_Lab
This repository provides a Docker-based lab demonstrating CVE-2026-24061, an authentication bypass vulnerability in GNU inetutils telnetd. The exploit leverages argument injection via the `USER` environment variable to bypass authentication and gain root access.
Classification
Working Poc 95%
Target:
GNU inetutils telnetd (version not specified)
No auth needed
Prerequisites:
Docker installed · Telnet client installed
nomisec
WORKING POC
by novitahk · remote
https://github.com/novitahk/Exploit-CVE-2026-24061
This exploit leverages a Telnet-based vulnerability (CVE-2026-24061) to send a crafted payload via netcat, likely achieving remote code execution (RCE) by injecting commands into a vulnerable service. The payload structure suggests it may exploit a buffer overflow or command injection flaw in the Telnet service.
Classification
Working Poc 80%
Target:
Unknown Telnet service (likely a specific implementation vulnerable to CVE-2026-24061)
No auth needed
Prerequisites:
Network access to the target's Telnet service (port 23) · Vulnerable Telnet service version
nomisec
WORKING POC
by cumakurt · remote
https://github.com/cumakurt/tscan
This repository contains a Python-based scanner and exploit for CVE-2026-24061, which allows remote authentication bypass in GNU Inetutils telnetd via the `USER=-f root` environment variable. The tool scans for vulnerable telnet services and attempts to exploit the vulnerability to gain root shell access.
Classification
Working Poc | Scanner 95%
Target:
GNU Inetutils telnetd through version 2.7
No auth needed
Prerequisites:
Python 3.6 or higher · telnet client installed · network access to target telnet service
nomisec
WORKING POC
by androidteacher · remote
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
This repository contains a functional PoC exploit for CVE-2026-24061, targeting a vulnerability in `inetutils-telnetd` that allows unauthenticated remote attackers to gain root privileges by manipulating the `USER` environment variable via Telnet protocol subnegotiation.
Classification
Working Poc 95%
Target:
inetutils-telnetd
No auth needed
Prerequisites:
Network access to the vulnerable telnetd service (port 23) · Vulnerable version of inetutils-telnetd running
nomisec
WRITEUP
by LucasPDiniz · poc
https://github.com/LucasPDiniz/CVE-2026-24061
This repository documents an authentication bypass vulnerability in GNU InetUtils telnetd (CVE-2026-24061) via argument injection by setting the USER environment variable to '-f root'. It includes setup instructions, exploit payload, and affected versions.
Classification
Writeup 90%
Target:
GNU InetUtils telnetd through 2.7
No auth needed
Prerequisites:
Vulnerable version of GNU InetUtils telnetd · Network access to the telnet service
nomisec
WORKING POC
by XsanFlip · poc
https://github.com/XsanFlip/CVE-2026-24061-Scanner
This repository contains a Bash script scanner for CVE-2026-24061, an authentication bypass vulnerability in GNU Inetutils telnetd. The script performs subnet scanning, banner grabbing, and active exploitation checks by injecting the `USER="-f root"` payload to verify vulnerability.
Classification
Working Poc | Scanner 95%
Target:
GNU Inetutils telnetd
No auth needed
Prerequisites:
Bash · Netcat (nc) · Telnet client · Network access to target
nomisec
WORKING POC
by punitdarji · remote
https://github.com/punitdarji/telnetd-cve-2026-24061
This PoC exploits a vulnerability in the Telnet protocol's NEW-ENVIRON option handling, allowing arbitrary command injection via malformed environment variable negotiation. The exploit establishes an interactive session with the target Telnet server and injects a payload (`-f root`) during subnegotiation.
Classification
Working Poc 95%
Target:
Telnet servers with NEW-ENVIRON option support (specific version not specified)
No auth needed
Prerequisites:
Network access to the target Telnet server · Telnet server with NEW-ENVIRON option enabled
nomisec
WORKING POC
by monstertsl · poc
https://github.com/monstertsl/CVE-2026-24061
This repository contains a working PoC for CVE-2026-24061, an authentication bypass vulnerability in GNU Inetutils telnetd (versions 1.9.3 to 2.7). The exploit leverages the USER environment variable to inject the '-f root' parameter into the login command, bypassing password authentication and granting root access.
Classification
Working Poc 95%
Target:
GNU Inetutils telnetd (1.9.3 to 2.7)
No auth needed
Prerequisites:
telnet client · network access to vulnerable telnetd service
nomisec
WORKING POC
by ms0x08-dev · remote
https://github.com/ms0x08-dev/CVE-2026-24061-POC
This PoC exploits a vulnerability in Telnet protocol handling by sending a malicious NEW_ENVIRON option with a crafted USER parameter to trigger remote command execution. The exploit establishes a connection, negotiates Telnet options, and injects the payload to achieve RCE.
Classification
Working Poc 90%
Target:
Telnet server (version not specified)
No auth needed
Prerequisites:
Network access to the target Telnet server · Telnet service running on the target
nomisec
WORKING POC
by typeconfused · poc
https://github.com/typeconfused/CVE-2026-24061
This repository contains a working proof-of-concept exploit for CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils telnetd. The exploit leverages argument injection via the `USER` environment variable to bypass authentication and gain root access.
Classification
Working Poc 100%
Target:
GNU InetUtils telnetd up to version 2.7-2
No auth needed
Prerequisites:
Access to a vulnerable GNU InetUtils telnetd service · Telnet client with the ability to set environment variables
nomisec
WORKING POC
by Alter-N0X · poc
https://github.com/Alter-N0X/CVE-2026-24061-POC
This PoC exploits CVE-2026-24061, an authentication bypass in GNU InetUtils telnetd via argument injection. It leverages Telnet protocol negotiation to inject a malformed USER variable, bypassing authentication and potentially gaining remote root access.
Classification
Working Poc 95%
Target:
GNU InetUtils telnetd ≤ 2.7
No auth needed
Prerequisites:
Network access to the target telnet service · Telnet service running on the target
nomisec
WRITEUP
by Mr-Zapi · poc
https://github.com/Mr-Zapi/CVE-2026-24061
This repository provides a detailed writeup and Nuclei template for detecting CVE-2026-24061, an argument injection vulnerability in GNU inetutils telnetd that allows unauthenticated root access via crafted USER environment variable.
Classification
Writeup 90%
Target:
GNU inetutils telnetd (e.g., inetutils-telnetd 2:2.0-1+deb11u2)
No auth needed
Prerequisites:
Target running vulnerable GNU inetutils telnetd · Network access to port 23
nomisec
STUB
by BrainBob · poc
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
The repository contains only a README with Docker commands to build and run a telnet service, but lacks any exploit code or details about CVE-2026-24061. It appears to be a placeholder or incomplete PoC.
Target:
unknown
No auth needed
Prerequisites:
Docker installed
nomisec
WORKING POC
by BrainBob · remote
https://github.com/BrainBob/CVE-2026-24061
This exploit targets a Telnet protocol vulnerability (CVE-2026-24061) by manipulating the NEW_ENVIRON option to inject a payload (`-f root`). It establishes an interactive session with the target, allowing command execution.
Classification
Working Poc 90%
Target:
Telnet server (unspecified version)
No auth needed
Prerequisites:
Network access to the target's Telnet port · Telnet service with vulnerable NEW_ENVIRON handling
nomisec
WORKING POC
by midox008 · remote
https://github.com/midox008/CVE-2026-24061
This Go-based PoC exploits CVE-2026-24061, an authentication bypass in GNU Inetutils telnetd (1.9.3-2.7) by injecting a malicious USER environment variable via the NEW-ENVIRON telnet option to execute `login -f root`, granting root access without credentials.
Classification
Working Poc 100%
Target:
GNU Inetutils telnetd 1.9.3-2.7
No auth needed
Prerequisites:
Network access to vulnerable telnetd service · Telnet service running with GNU Inetutils 1.9.3-2.7
nomisec
WORKING POC
by z3n70 · remote
https://github.com/z3n70/CVE-2026-24061
This Ruby script exploits a vulnerability in telnet services by manipulating environment variable negotiation (NEW_ENVIRON) to inject payloads. It checks for successful exploitation by detecting root or shell indicators in the response.
Classification
Working Poc 90%
Target:
Telnet service with NEW_ENVIRON support
No auth needed
Prerequisites:
Target must support telnet and NEW_ENVIRON negotiation
nomisec
WORKING POC
by r00tuser111 · remote
https://github.com/r00tuser111/CVE-2026-24061
This repository contains a working PoC for CVE-2026-24061, a Telnet NEW-ENVIRON RCE vulnerability. The exploit leverages Telnet protocol negotiation to inject a malicious USER environment variable, achieving root access.
Classification
Working Poc 95%
Target:
Telnet daemon (specific version not specified)
No auth needed
Prerequisites:
Telnet service exposed on port 23 · Vulnerable Telnet daemon version
nomisec
WORKING POC
by Mefhika120 · remote
https://github.com/Mefhika120/Ashwesker-CVE-2026-24061
This PoC exploits CVE-2026-24061, an authentication bypass in GNU Inetutils telnetd, allowing unauthenticated remote root access via a malicious USER environment variable. It uses telnetlib3 to send a crafted payload and drops into an interactive shell upon successful exploitation.
Classification
Working Poc 95%
Target:
GNU Inetutils telnetd 1.9.3-2.7
No auth needed
Prerequisites:
Target must have telnetd exposed on port 23 · Target must be running vulnerable GNU Inetutils telnetd version
vulncheck_xdb
WORKING POC
remote
https://github.com/Lingzesec/cve-2026-24061-GUI
This repository contains a functional GUI tool for detecting and exploiting CVE-2026-24061, an authentication bypass vulnerability in GNU Inetutils telnetd that allows root access without credentials. The tool includes scanning capabilities (single target, IP ranges, CIDR) and interactive shell functionality.
Classification
Working Poc 95%
Target:
GNU Inetutils telnetd
No auth needed
Prerequisites:
Network access to target telnet service (port 23) · Python 3.8+ with PyQt5
vulncheck_xdb
WORKING POC
remote
https://github.com/Alter-N0X/CVE-2026-24061-PoC
This repository contains a functional exploit for CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils telnetd. The exploit leverages malformed Telnet NEW_ENVIRON negotiation to bypass authentication and gain remote root access.
Classification
Working Poc 95%
Target:
GNU InetUtils telnetd ≤ 2.7
No auth needed
Prerequisites:
Network access to the vulnerable telnetd service
metasploit
WORKING POC
GREAT
by jheysel-r7, Kyu Neushwaistein · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/telnet/gnu_inetutils_auth_bypass.rb
This Metasploit module exploits CVE-2026-24061, an authentication bypass in GNU Inetutils telnetd. It manipulates the USER environment variable during Telnet sub-negotiation to inject '-f root', bypassing authentication and spawning a root shell.
Classification
Working Poc 100%
Target:
GNU Inetutils telnetd up to version 2.7
No auth needed
Prerequisites:
Telnet service exposed on port 23 · GNU Inetutils telnetd version <= 2.7