尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/GNU%20InetUtils%20telnetd%20%E5%8F%82%E6%95%B0%E6%B3%A8%E5%85%A5%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2026-24061.md | POC详情 |
| 2 | GNU Inetutils telnetd through 2.7 contains an authentication bypass caused by setting the USER environment variable to \"-f root\", letting remote attackers bypass authentication, exploit requires remote access to telnetd service. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2026/CVE-2026-24061.yaml | POC详情 |
| 3 | https://github.com/vulhub/vulhub/blob/master/inetutils/CVE-2026-24061/README.md | POC详情 | |
| 4 | A small docker lab to play with cve-2026-24061, the inetutils-telnetd authentication bypass. | https://github.com/leonjza/inetutils-telnetd-auth-bypass | POC详情 |
| 5 | Bypass d’authentification Telnet menant à un accès root | https://github.com/duy-31/CVE-2026-24061---telnetd | POC详情 |
| 6 | CVE-2026-24061 Batch Scanning Tool | https://github.com/TryA9ain/CVE-2026-24061 | POC详情 |
| 7 | 基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具 | https://github.com/parameciumzhang/Tell-Me-Root | POC详情 |
| 8 | None | https://github.com/Chocapikk/CVE-2026-24061 | POC详情 |
| 9 | None | https://github.com/JayGLXR/CVE-2026-24061-POC | POC详情 |
| 10 | GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。 | https://github.com/yanxinwu946/CVE-2026-24061--telnetd | POC详情 |
| 11 | Exploitation of CVE-2026-24061 | https://github.com/SafeBreach-Labs/CVE-2026-24061 | POC详情 |
| 12 | CVE-2026-24061 - Exploit | https://github.com/h3athen/CVE-2026-24061 | POC详情 |
| 13 | None | https://github.com/xuemian168/CVE-2026-24061 | POC详情 |
| 14 | CVE-2026-24061 漏洞检测工具 | https://github.com/monstertsl/CVE-2026-24061 | POC详情 |
| 15 | CVE-2026-24061 环境 | https://github.com/r00tuser111/CVE-2026-24061 | POC详情 |
| 16 | inetutils-telnetd Authentication Bypass - working | https://github.com/balgan/CVE-2026-24061 | POC详情 |
| 17 | Proof of Concept: CVE-2026-24061 is a critical authentication bypass vulnerability in GNU inetutils-telnetd allowing unauthenticated remote attackers to gain instant root shell access via malicious NEW_ENVIRON telnet option exploitation. | https://github.com/SystemVll/CVE-2026-24061 | POC详情 |
| 18 | None | https://github.com/z3n70/CVE-2026-24061 | POC详情 |
| 19 | Nuclei template for CVE-2026-24061 | https://github.com/Mr-Zapi/CVE-2026-24061 | POC详情 |
| 20 | GNU Inetutils telnetd Remote Authentication Bypass | https://github.com/midox008/CVE-2026-24061 | POC详情 |
| 21 | None | https://github.com/BrainBob/CVE-2026-24061 | POC详情 |
| 22 | None | https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061 | POC详情 |
| 23 | CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards. | https://github.com/0p5cur/CVE-2026-24061-POC | POC详情 |
| 24 | Docker setup for CVE-2026-24061 | https://github.com/shivam-bathla/CVE-2026-24061-setup | POC详情 |
| 25 | CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypass | https://github.com/madfxr/Twenty-Three-Scanner | POC详情 |
| 26 | CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing | https://github.com/Alter-N0X/CVE-2026-24061-POC | POC详情 |
| 27 | GNU telnetd service from GNU InetUtils authentication-bypass | https://github.com/typeconfused/CVE-2026-24061 | POC详情 |
| 28 | CVE-2026-24061 | https://github.com/Mefhika120/Ashwesker-CVE-2026-24061 | POC详情 |
| 29 | CVE-2026-24061 PoC | https://github.com/infat0x/CVE-2026-24061 | POC详情 |
| 30 | None | https://github.com/ms0x08-dev/CVE-2026-24061-POC | POC详情 |
| 31 | None | https://github.com/punitdarji/telnetd-cve-2026-24061 | POC详情 |
| 32 | CVE-2026-24061-Scanner by XsanLahci | https://github.com/XsanFlip/CVE-2026-24061-Scanner | POC详情 |
| 33 | CVE-2026-24061 GNU Inetutils telnetd 身份验证绕过漏洞检测与利用 GUI 工具 | https://github.com/Lingzesec/CVE-2026-24061-GUI | POC详情 |
| 34 | Vulnerability in GNU InetUtils telnetd Enables Remote Root Access | https://github.com/LucasPDiniz/CVE-2026-24061 | POC详情 |
| 35 | None | https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root | POC详情 |
| 36 | None | https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd | POC详情 |
| 37 | Telnetd Auth Bypass Scanner (CVE-2026-24061) A Python-based scanner for detecting and exploiting the CVE-2026-24061 vulnerability in GNU Inetutils telnetd services. This tool scans IP addresses or networks for vulnerable telnetd services that allow authentication bypass leading to root shell access. | https://github.com/cumakurt/tscan | POC详情 |
| 38 | Payload CVE-2026-24061 | https://github.com/novitahk/Exploit-CVE-2026-24061 | POC详情 |
| 39 | Lab to show the CVE-2026-24061 | https://github.com/Gabs-hub/CVE-2026-24061_Lab | POC详情 |
| 40 | GNU Inetutils telnet远程认证绕过漏洞(CVE-2026-24061),该漏洞源于 GNU Inetutils telnetd 组件中对环境变量处理不当,攻击者可利用该漏洞,通过构造恶意的 USER 环境变量并发送至受影响的 telnet 服务,触发认证绕过机制,进而实现无需密码直接获取root权限。 | https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061- | POC详情 |
| 41 | Tell Me Root (Batch Scanning Tool for the CVE-2026-24061 Telnet Authentication Bypass) | https://github.com/hilwa24/CVE-2026-24061 | POC详情 |
| 42 | CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows | https://github.com/0x7556/CVE-2026-24061 | POC详情 |
| 43 | None | https://github.com/Parad0x7e/CVE-2026-24061 | POC详情 |
| 44 | Checks for CVE-2026-24061 Telnetd exploit | https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester | POC详情 |
| 45 | This is a simple PoC that allows you to highlight the severity of the ongoing and actively exploited Telnet bug that is going on right now. Why people are still using Telnet... beyond me. | https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061 | POC详情 |
| 46 | Scanner for CVE-2026-24061 | https://github.com/buzz075/CVE-2026-24061 | POC详情 |
| 47 | POC Script for CVE-2026-24061 (GNU Telnetd Exploit) | https://github.com/X-croot/CVE-2026-24061_POC | POC详情 |
| 48 | Native Python Exploit & Mass Scanner for CVE-2026-24061 (GNU InetUtils Telnetd). Bypasses authentication via NEW-ENVIRON injection (USER=-f root) to get immediate root shell. Features parallel scanning (CIDR support) and robust result logging. | https://github.com/franckferman/CVE_2026_24061_PoC | POC详情 |
| 49 | A docker image for CVE-2026-24061 in InetUtils telnetd. | https://github.com/SeptembersEND/CVE--2026-24061 | POC详情 |
| 50 | CVE-2026-24061 PoC and walkthrough | https://github.com/ibrahmsql/CVE-2026-24061-PoC | POC详情 |
| 51 | 🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication. | https://github.com/obrunolima1910/CVE-2026-24061 | POC详情 |
| 52 | None | https://github.com/lavabyte/telnet-CVE-2026-24061 | POC详情 |
| 53 | None | https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061 | POC详情 |
| 54 | None | https://github.com/killsystema/scan-cve-2026-24061 | POC详情 |
| 55 | A passive detection tool for identifying potential exposure to CVE-2026-24061 in GNU inetutils telnet installations | https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector | POC详情 |
| 56 | CVE-2026-24061 PoC | https://github.com/scumfrog/cve-2026-24061 | POC详情 |
| 57 | A lightweight Docker lab for experimenting with Telnet protocol negotiation, explained in the CVE-2026-24061 exploit, which contains automatic username injection using the NEW-ENVIRON option. | https://github.com/tiborscholtz/CVE-2026-24061 | POC详情 |
| 58 | None | https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell- | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论