CVE-2026-32746
GNU inetutils telnetd LINEMODE SLC Buffer Overflow
Description
telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
INFO
Published Date :
March 13, 2026, 7:55 p.m.
Last Modified :
March 23, 2026, 2:16 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | MITRE-CVE | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update GNU inetutils to the latest version.
- Apply vendor-provided patches for telnetd.
- Disable the LINEMODE option if possible.
- Remove or disable telnetd if not needed.
Public PoC/Exploit Available at Github
CVE-2026-32746 has a 11 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-32746.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-32746 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-32746
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
scanner/exploiter CVE-2026-24061 & CVE-2026-32746
Python
None
Dockerfile Python
None
Jupyter Notebook Python
None
HTML
None
Python
Autonomous security research framework - AI agents iterate exploits overnight (inspired by Karpathy's autoresearch)
Python Dockerfile
CVE-2026-32746 - GNU InetUtils telnetd LINEMODE SLC Buffer Overflow PoC (pre-auth RCE, CVSS 9.8)
Dockerfile Python
Latest CVEs with their Proof of Concept exploits.
Python HTML
None
Python
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
bugbounty cve exp exploit payload poc rce vulnerability
Shell
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-32746 vulnerability anywhere in the article.
-
CybersecurityNews
Synology DiskStation Manager Vulnerability Allow Remote Attackers to Execute Arbitrary Commands
A critical security advisory has been issued for a severe vulnerability in DiskStation Manager (DSM) that allows unauthenticated remote attackers to execute arbitrary commands. Given the widespread us ... Read more
-
Daily CyberSecurity
NAS Under Siege: Critical 9.8 CVSS Bug in Synology Telnet Opens the Door to Total Hijack
Synology has issued an urgent security update for its DiskStation Manager (DSM) operating system to address a critical vulnerability in the Telnet service. The flaw, tracked as CVE-2026-32746, could a ... Read more
-
The Hacker News
⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a ... Read more
-
security.nl
32 jaar oud Telnet-lek kan aanvaller volledige controle over servers geven
Onderzoekers hebben een 32 jaar oude kwetsbaarheid in Telnet ontdekt waardoor aanvallers in het ergste geval volledige controle over de server kunnen krijgen. Een beveiligingsupdate is nog niet beschi ... Read more
-
CybersecurityNews
Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23
A critical buffer overflow vulnerability in the GNU Inetutils telnetd daemon. Tracked as CVE-2026-32746, this flaw allows an unauthenticated remote attacker to execute arbitrary code and gain root acc ... Read more
-
The Hacker News
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary ... Read more
The following table lists the changes that have been made to the
CVE-2026-32746 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 23, 2026
Action Type Old Value New Value Added Reference https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 19, 2026
Action Type Old Value New Value Removed Reference https://github.com/jeffaf/cve-2026-32746 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 18, 2026
Action Type Old Value New Value Added Reference https://github.com/jeffaf/cve-2026-32746 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Mar. 16, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/03/14/1 -
New CVE Received by [email protected]
Mar. 13, 2026
Action Type Old Value New Value Added Description telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-120 Added Reference https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html Added Reference https://www.openwall.com/lists/oss-security/2026/03/12/4