


Perceptive Security
SOC/SIEM Consultancy

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check w…
Published:
12 March 2026 at 23:00:00
Alert date:
13 March 2026 at 20:06:20
Source:
nvd.nist.gov
Operating Systems, Network Infrastructure
CVE-2026-32746 affects telnetd in GNU inetutils through version 2.7, allowing an out-of-bounds write vulnerability in the LINEMODE SLC (Set Local Characters) suboption handler. The vulnerability occurs because the add_slc function does not properly check whether the buffer is full before writing data. This buffer overflow condition could potentially be exploited by attackers to execute arbitrary code or cause denial of service. The vulnerability affects all versions of GNU inetutils up to and including version 2.7. Given the widespread use of telnetd in network services, this represents a significant security risk for affected systems.
Technical details
Mitigation steps:
Affected products:
GNU inetutils
telnetd
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32746
https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html
https://www.openwall.com/lists/oss-security/2026/03/12/4
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
