Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32746: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in GNU inetutils

0
Critical
VulnerabilityCVE-2026-32746cvecve-2026-32746cwe-120
Published: Fri Mar 13 2026 (03/13/2026, 17:15:14 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: inetutils

Description

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

AI-Powered Analysis

AILast updated: 03/13/2026, 17:44:11 UTC

Technical Analysis

CVE-2026-32746 is a classic buffer overflow vulnerability classified under CWE-120, found in the telnetd daemon of GNU inetutils versions through 2.7. The vulnerability stems from the add_slc function, which handles the LINEMODE SLC (Set Local Characters) suboption in the telnet protocol. This function does not properly verify whether the buffer it writes to is full before performing a write operation, resulting in an out-of-bounds memory write. Such unchecked buffer copying can corrupt adjacent memory, potentially allowing an attacker to execute arbitrary code, crash the service, or cause denial of service. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 9.8 indicates critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H). While no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a prime target for attackers. GNU inetutils is commonly used in various Unix-like operating systems, especially in server environments where telnet services remain active for legacy or specific use cases. The lack of patch links suggests that a fix may not yet be publicly available, underscoring the urgency for mitigation.

Potential Impact

The vulnerability allows remote attackers to perform out-of-bounds writes on systems running vulnerable versions of GNU inetutils telnetd, potentially leading to arbitrary code execution, full system compromise, or denial of service. This threatens the confidentiality, integrity, and availability of affected systems. Organizations relying on telnetd for remote management or legacy applications face significant risk, as attackers can exploit this flaw without authentication or user interaction. The impact is especially severe in critical infrastructure, enterprise servers, and environments where telnet remains in use. Exploitation could facilitate lateral movement within networks, data breaches, or service outages. Given the critical CVSS score and the network-exploitable nature, this vulnerability poses a high risk to global organizations using affected software.

Mitigation Recommendations

1. Immediately disable telnet services on all systems where it is not strictly necessary, replacing it with secure alternatives such as SSH. 2. For systems requiring telnetd, monitor vendor announcements closely and apply patches as soon as they become available. 3. Implement network-level controls such as firewall rules to restrict telnet access to trusted IP addresses only. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics that can detect anomalous telnet traffic or attempts to exploit buffer overflows. 5. Conduct thorough audits of systems to identify any running vulnerable versions of GNU inetutils and prioritize remediation. 6. Use application whitelisting and endpoint protection solutions to detect and block exploitation attempts. 7. Educate system administrators about the risks of legacy protocols and encourage migration to secure alternatives. 8. In environments where patching is delayed, consider deploying runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) to mitigate exploitation impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-13T17:15:14.405Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b4498e2f860ef94328433b

Added to database: 3/13/2026, 5:29:50 PM

Last enriched: 3/13/2026, 5:44:11 PM

Last updated: 3/13/2026, 6:48:46 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses