{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreig6tr2eiirrjnlq6zhpj5pm6h3tdlsyc7wm5qk6yc665qifdtqaru",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfrvpqpodox2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibtftkqwtlftbbopjpjtpwwylj7jjlaiodgn54qx54cwqn3hnupou"
},
"mimeType": "image/jpeg",
"size": 115348
},
"path": "/27-year-old-telnet-vulnerability-cve-2026-24061-grants-root-access/",
"publishedAt": "2026-02-26T16:57:44.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"27-Year-Old Telnet Vulnerability CVE-2026-24061 Grants Root Access",
"VPN Central"
],
"textContent": "A critical flaw in GNU Inetutils telnet daemon affects versions through 2.7. Tracked as CVE-2026-24061, it allows remote attackers to gain root access without authentication. Security researcher Ron Ben Yizhak from SafeBreach discovered improper environment variable sanitization. Telnetd passes client-supplied variables directly to /bin/login running as root. Linux kernel sets AT_SECURE=0, disabling glibc secure-execution mode. […]\n\nThe post 27-Year-Old Telnet Vulnerability CVE-2026-24061 Grants Root Access appeared first on VPN Central.",
"title": "27-Year-Old Telnet Vulnerability CVE-2026-24061 Grants Root Access"
}