{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreig6tr2eiirrjnlq6zhpj5pm6h3tdlsyc7wm5qk6yc665qifdtqaru",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfrvpqpodox2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibtftkqwtlftbbopjpjtpwwylj7jjlaiodgn54qx54cwqn3hnupou"
    },
    "mimeType": "image/jpeg",
    "size": 115348
  },
  "path": "/27-year-old-telnet-vulnerability-cve-2026-24061-grants-root-access/",
  "publishedAt": "2026-02-26T16:57:44.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "27-Year-Old Telnet Vulnerability CVE-2026-24061 Grants Root Access",
    "VPN Central"
  ],
  "textContent": "A critical flaw in GNU Inetutils telnet daemon affects versions through 2.7. Tracked as CVE-2026-24061, it allows remote attackers to gain root access without authentication. Security researcher Ron Ben Yizhak from SafeBreach discovered improper environment variable sanitization. Telnetd passes client-supplied variables directly to /bin/login running as root. Linux kernel sets AT_SECURE=0, disabling glibc secure-execution mode. […]\n\nThe post 27-Year-Old Telnet Vulnerability CVE-2026-24061 Grants Root Access appeared first on VPN Central.",
  "title": "27-Year-Old Telnet Vulnerability CVE-2026-24061 Grants Root Access"
}