{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiguw7mns24oszhlavmyvpprptoceniebfcwagg6gujescidibcdhy",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mhdzpf5li6r2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidcu7smbztaofxz6a4gf6wd5zb4m3uuqh4nb2d3en7a277ub3v44q"
    },
    "mimeType": "image/jpeg",
    "size": 112678
  },
  "path": "/critical-gnu-inetutils-telnetd-flaw-allows-pre-auth-remote-code-execution-over-port-23/",
  "publishedAt": "2026-03-18T14:19:16.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Critical GNU Inetutils telnetd flaw allows pre-auth remote code execution over port 23",
    "VPN Central"
  ],
  "textContent": "A critical vulnerability in GNU Inetutils telnetd can let an unauthenticated remote attacker trigger memory corruption during the Telnet handshake and potentially execute code as root. The flaw is tracked as CVE-2026-32746, affects GNU Inetutils telnetd through version 2.7, and carries a CVSS 3.1 score of 9.8 from MITRE. The bug sits in the LINEMODE […]\n\nThe post Critical GNU Inetutils telnetd flaw allows pre-auth remote code execution over port 23 appeared first on VPN Central.",
  "title": "Critical GNU Inetutils telnetd flaw allows pre-auth remote code execution over port 23"
}