LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32746

CVE-2026-32746 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 16, 2026

GNU inetutils telnetd - Buffer Overflow

Published: March 13, 2026Updated: March 16, 2026Remote Exploitable

Overview

GNU inetutils telnetd <= 2.7 contains a buffer overflow caused by lack of bounds checking in the LINEMODE SLC suboption handler, letting remote attackers perform out-of-bounds write, exploit requires network access to telnetd service.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 2.9%(Probability of exploitation in next 30 days)

Impact

Remote attackers can perform out-of-bounds write, potentially leading to code execution or service crash.

Mitigation

Update to a version later than 2.7 or the latest available version.

Social Media Activity(2 posts)

/r/netsec
/r/netsec
@_r_netsec
Apr 17, 2026

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/

View original post
/r/netsec
/r/netsec
@_r_netsec
Apr 17, 2026

CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) https://pwn.guide/free/other/cve-2026-32746

View original post

Details

CVE ID
CVE-2026-32746
Severity
Critical
CVSS Score
9.8
Type
buffer_overflow
Status
unconfirmed
EPSS
2.9%
Social Posts
2

CWE

  • CWE-120

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

2.9%Probability of exploitation in the next 30 days