4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / signatures.db DB
{
  "cve": "CVE-2026-24061",
  "name": "Telnet NEW_ENVIRON Authentication Bypass & Remote Code Execution",
  "description": "Improper sanitization of USER environment variable during Telnet NEW_ENVIRON subnegotiation allows authentication bypass and privilege escalation to root",
  "severity": "CRITICAL",
  "cvss_score": 9.8,
  "attack_vector": "NETWORK",
  "requires_auth": false,
  "exploit_available": true,
  "references": [
    "https://github.com/SafeBreach-Labs/CVE-2026-24061",
    "https://github.com/TryA9ain/CVE-2026-24061"
  ],
  "vulnerable_versions": [
    {
      "daemon": "netkit-telnetd",
      "vendor": "netkit",
      "version_pattern": "^0\\.17(\\..*)?$",
      "description": "netkit-telnetd version 0.17 and variants",
      "platforms": ["Linux"],
      "confidence": "high"
    },
    {
      "daemon": "bsd-telnetd",
      "vendor": "BSD",
      "version_pattern": "^0\\.[0-5](\\..*)?$",
      "description": "BSD telnetd versions 0.0 through 0.5",
      "platforms": ["BSD", "FreeBSD", "OpenBSD"],
      "confidence": "high"
    },
    {
      "daemon": "inetutils-telnetd",
      "vendor": "GNU",
      "version_pattern": "^[12]\\.",
      "description": "GNU inetutils telnetd versions 1.x and 2.x (all versions affected)",
      "platforms": ["Linux"],
      "confidence": "high"
    },
    {
      "daemon": "telnetd",
      "vendor": "generic",
      "version_pattern": ".*",
      "description": "Generic telnetd implementations (requires manual verification)",
      "platforms": ["Linux", "Unix", "IoT"],
      "confidence": "low"
    }
  ],
  "patched_versions": [
    {
      "daemon": "netkit-telnetd",
      "version": "0.18+",
      "notes": "Properly sanitizes USER environment variable"
    },
    {
      "daemon": "bsd-telnetd",
      "version": "0.6+",
      "notes": "Implements validation for NEW_ENVIRON variables"
    }
  ],
  "detection_indicators": {
    "new_environ_support": true,
    "banner_keywords": ["telnetd", "Telnet", "Welcome"],
    "vulnerable_option_code": 39,
    "subnegotiation_required": true
  },
  "exploitation": {
    "method": "NEW_ENVIRON subnegotiation with malicious USER variable",
    "payload": "-f root",
    "mechanism": "Command-line argument injection during authentication",
    "impact": "Complete system compromise with root privileges",
    "bypass_techniques": [
      "Password authentication bypass",
      "Privilege escalation to root",
      "No user interaction required"
    ]
  },
  "last_updated": "2026-01-28",
  "signature_version": "1.0.0"
}