Local IP: 172.25.200.200

Port: 23

The Flag is in /root/flag.txt

Walkthrough:

Start the vulnerable Docker container:

docker run -d -p 23:23 --name flag-red62 --restart always joshbeck2024/ctf-cve-2026-24061-telnetd

PoC Code: (We will break it down in this lesson.)

<https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd>

This article is excellent and does a very good job of explaining the mechanics of this CVE: (Click Here)

<https://www.safebreach.com/blog/safebreach-labs-root-cause-analysis-and-poc-exploit-for-cve-2026-24061/>

First things first:

Environment Variable Passing: Part of this negotiation allows the client to send environment variables to the server to customize the session (e.g., passing the local username USER to avoid re-typing it).