支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2026-24061 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
参数注入或修改
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
GNU Inetutils 参数注入漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
GNU Inetutils是美国GNU社区的一组常见的网络程序。 GNU Inetutils 2.7及之前版本存在参数注入漏洞,该漏洞源于通过USER环境变量绕过远程身份验证。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
GNUInetutils 1.9.3 ~ 2.7 -
二、漏洞 CVE-2026-24061 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/GNU%20InetUtils%20telnetd%20%E5%8F%82%E6%95%B0%E6%B3%A8%E5%85%A5%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2026-24061.mdPOC详情
2GNU Inetutils telnetd through 2.7 contains an authentication bypass caused by setting the USER environment variable to \"-f root\", letting remote attackers bypass authentication, exploit requires remote access to telnetd service. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2026/CVE-2026-24061.yamlPOC详情
3https://github.com/vulhub/vulhub/blob/master/inetutils/CVE-2026-24061/README.mdPOC详情
4A small docker lab to play with cve-2026-24061, the inetutils-telnetd authentication bypass.https://github.com/leonjza/inetutils-telnetd-auth-bypassPOC详情
5Bypass d’authentification Telnet menant à un accès roothttps://github.com/duy-31/CVE-2026-24061---telnetdPOC详情
6CVE-2026-24061 Batch Scanning Toolhttps://github.com/TryA9ain/CVE-2026-24061POC详情
7基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具https://github.com/parameciumzhang/Tell-Me-RootPOC详情
8Nonehttps://github.com/Chocapikk/CVE-2026-24061POC详情
9Nonehttps://github.com/JayGLXR/CVE-2026-24061-POCPOC详情
10GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。https://github.com/yanxinwu946/CVE-2026-24061--telnetdPOC详情
11Exploitation of CVE-2026-24061https://github.com/SafeBreach-Labs/CVE-2026-24061POC详情
12CVE-2026-24061 - Exploithttps://github.com/h3athen/CVE-2026-24061POC详情
13Nonehttps://github.com/xuemian168/CVE-2026-24061POC详情
14CVE-2026-24061 漏洞检测工具https://github.com/monstertsl/CVE-2026-24061POC详情
15CVE-2026-24061 环境https://github.com/r00tuser111/CVE-2026-24061POC详情
16inetutils-telnetd Authentication Bypass - workinghttps://github.com/balgan/CVE-2026-24061POC详情
17Proof of Concept: CVE-2026-24061 is a critical authentication bypass vulnerability in GNU inetutils-telnetd allowing unauthenticated remote attackers to gain instant root shell access via malicious NEW_ENVIRON telnet option exploitation.https://github.com/SystemVll/CVE-2026-24061POC详情
18Nonehttps://github.com/z3n70/CVE-2026-24061POC详情
19Nuclei template for CVE-2026-24061https://github.com/Mr-Zapi/CVE-2026-24061POC详情
20GNU Inetutils telnetd Remote Authentication Bypasshttps://github.com/midox008/CVE-2026-24061POC详情
21Nonehttps://github.com/BrainBob/CVE-2026-24061POC详情
22Nonehttps://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061POC详情
23CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards.https://github.com/0p5cur/CVE-2026-24061-POCPOC详情
24Docker setup for CVE-2026-24061https://github.com/shivam-bathla/CVE-2026-24061-setupPOC详情
25CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypasshttps://github.com/madfxr/Twenty-Three-ScannerPOC详情
26CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing https://github.com/Alter-N0X/CVE-2026-24061-POCPOC详情
27GNU telnetd service from GNU InetUtils authentication-bypasshttps://github.com/typeconfused/CVE-2026-24061POC详情
28CVE-2026-24061https://github.com/Mefhika120/Ashwesker-CVE-2026-24061POC详情
29CVE-2026-24061 PoChttps://github.com/infat0x/CVE-2026-24061POC详情
30Nonehttps://github.com/ms0x08-dev/CVE-2026-24061-POCPOC详情
31Nonehttps://github.com/punitdarji/telnetd-cve-2026-24061POC详情
32CVE-2026-24061-Scanner by XsanLahcihttps://github.com/XsanFlip/CVE-2026-24061-ScannerPOC详情
33CVE-2026-24061 GNU Inetutils telnetd 身份验证绕过漏洞检测与利用 GUI 工具https://github.com/Lingzesec/CVE-2026-24061-GUIPOC详情
34Vulnerability in GNU InetUtils telnetd Enables Remote Root Accesshttps://github.com/LucasPDiniz/CVE-2026-24061POC详情
35Nonehttps://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2rootPOC详情
36Nonehttps://github.com/androidteacher/CVE-2026-24061-PoC-TelnetdPOC详情
37Telnetd Auth Bypass Scanner (CVE-2026-24061) A Python-based scanner for detecting and exploiting the CVE-2026-24061 vulnerability in GNU Inetutils telnetd services. This tool scans IP addresses or networks for vulnerable telnetd services that allow authentication bypass leading to root shell access.https://github.com/cumakurt/tscanPOC详情
38Payload CVE-2026-24061https://github.com/novitahk/Exploit-CVE-2026-24061POC详情
39Lab to show the CVE-2026-24061https://github.com/Gabs-hub/CVE-2026-24061_LabPOC详情
40GNU Inetutils telnet远程认证绕过漏洞(CVE-2026-24061),该漏洞源于 GNU Inetutils telnetd 组件中对环境变量处理不当,攻击者可利用该漏洞,通过构造恶意的 USER 环境变量并发送至受影响的 telnet 服务,触发认证绕过机制,进而实现无需密码直接获取root权限。https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-POC详情
41Tell Me Root (Batch Scanning Tool for the CVE-2026-24061 Telnet Authentication Bypass)https://github.com/hilwa24/CVE-2026-24061POC详情
42CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windowshttps://github.com/0x7556/CVE-2026-24061POC详情
43Nonehttps://github.com/Parad0x7e/CVE-2026-24061POC详情
44Checks for CVE-2026-24061 Telnetd exploithttps://github.com/dotelpenguin/telnetd_CVE-2026-24061_testerPOC详情
45This is a simple PoC that allows you to highlight the severity of the ongoing and actively exploited Telnet bug that is going on right now. Why people are still using Telnet... beyond me.https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061POC详情
46Scanner for CVE-2026-24061https://github.com/buzz075/CVE-2026-24061POC详情
47POC Script for CVE-2026-24061 (GNU Telnetd Exploit) https://github.com/X-croot/CVE-2026-24061_POCPOC详情
48Native Python Exploit & Mass Scanner for CVE-2026-24061 (GNU InetUtils Telnetd). Bypasses authentication via NEW-ENVIRON injection (USER=-f root) to get immediate root shell. Features parallel scanning (CIDR support) and robust result logging.https://github.com/franckferman/CVE_2026_24061_PoCPOC详情
49A docker image for CVE-2026-24061 in InetUtils telnetd.https://github.com/SeptembersEND/CVE--2026-24061POC详情
50CVE-2026-24061 PoC and walkthroughhttps://github.com/ibrahmsql/CVE-2026-24061-PoCPOC详情
51🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.https://github.com/obrunolima1910/CVE-2026-24061POC详情
52Nonehttps://github.com/lavabyte/telnet-CVE-2026-24061POC详情
53Nonehttps://github.com/canpilayda/inetutils-telnetd-cve-2026-24061POC详情
54Nonehttps://github.com/killsystema/scan-cve-2026-24061POC详情
55A passive detection tool for identifying potential exposure to CVE-2026-24061 in GNU inetutils telnet installationshttps://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-DetectorPOC详情
56CVE-2026-24061 PoChttps://github.com/scumfrog/cve-2026-24061POC详情
57A lightweight Docker lab for experimenting with Telnet protocol negotiation, explained in the CVE-2026-24061 exploit, which contains automatic username injection using the NEW-ENVIRON option.https://github.com/tiborscholtz/CVE-2026-24061POC详情
58Nonehttps://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2026-24061 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2026-24061 的评论

暂无评论


发表评论