Local IP: 172.25.200.200
Port: 23
CVE-2026-24061 is a critical authentication bypass vulnerability in the GNU telnetd service that allows remote attackers to gain root access without credentials by manipulating the USER and PATH environment variables.. This flaw enables the injection of arguments (specifically the -f flag) into the /usr/bin/login process, allowing a complete bypass of authentication.apt install docker.iodocker run -d -p 23:23 --name flag-red62 --restart always joshbeck2024/ctf-cve-2026-24061-telnetd
telnetd server.<https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd>
<https://www.safebreach.com/blog/safebreach-labs-root-cause-analysis-and-poc-exploit-for-cve-2026-24061/>
If you are running telnet in a production environment, you deserve what you have coming to you! It’s an insecure protocol of last resort, in my opinion. You should probably use ssh instead. (Change my mind!)
Let’s say you throw caution to the wind and run telnetd anyway. Here’s a breakdown of the telnet protocol and how it is exploited:
exploit.pyoxff (/xff) (255) are defined in the telnet RFC documentation, which we will look at shortly.
USER to avoid re-typing it).