A critical vulnerability, CVE-2026-24061, affects the telnetd daemon in GNU Inetutils (vulnerable versions: since 1.9.3 up to and including 2.7). The flaw allows remote authentication bypass via a “-f root” value for the USER environment variable, permitting an unauthenticated attacker to influence how telnetd interprets the USER value and bypass normal authentication checks. Successful exploitation can result in unauthorized remote access and potential full system compromise on hosts running the vulnerable telnetd service. Upstream patches have been published to correct the unsafe handling of USER values; administrators should remove or patch telnetd where possible and restrict access to the telnet port until mitigations are applied.
IONIX research team developed a simulation to validate exposure to CVE-2026-24061. Confirmed findings are listed in this post.
References:

