A 32-year-old vulnerability in GNU inetutils Telnetd was recently discovered and assigned CVE-2026-32746. The flaw allows attackers to overflow a global variable via SLC negotiation without proper bounds checking. Although this leads to memory corruption, exploitation is complicated by restrictions on the data format and processing logic that modifies received triplets before storing them in the vulnerable buffer. Despite these challenges, researchers confirmed remote code execution remains possible under certain conditions.
Read the full article at watchTowr Labs - Blog
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





