top of page
perceptive_background_267k.jpg

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check w…

Published:

12 March 2026 at 23:00:00

Alert date:

13 March 2026 at 20:06:20

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Network Infrastructure

CVE-2026-32746 affects telnetd in GNU inetutils through version 2.7, allowing an out-of-bounds write vulnerability in the LINEMODE SLC (Set Local Characters) suboption handler. The vulnerability occurs because the add_slc function does not properly check whether the buffer is full before writing data. This buffer overflow condition could potentially be exploited by attackers to execute arbitrary code or cause denial of service. The vulnerability affects all versions of GNU inetutils up to and including version 2.7. Given the widespread use of telnetd in network services, this represents a significant security risk for affected systems.

Technical details

Mitigation steps:

Affected products:

GNU inetutils
telnetd

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page