Description
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
Exploits (5)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-28372
github
WORKING POC
1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-28372
nomisec
WORKING POC
by mbanyamer · poc
https://github.com/mbanyamer/CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation
nomisec
WORKING POC
by kalibb · poc
https://github.com/kalibb/CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation-main
References (9)
Scores
CVSS v3
7.4
EPSS
0.0001
EPSS Percentile
2.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
vulnerable
docker pull ghcr.io/exploitintel/cve-2026-28372-vulnerable:latest
Classification
CWE
CWE-829
Status
published
Affected Products (1)
gnu/inetutils
< 2.7
Timeline
Published
Feb 27, 2026
Tracked Since
Feb 27, 2026