============================================================================================================================================= | # Title : GNU Inetutils Telnet Authentication Bypass PHP Proof of Concept | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 147.0.3 (64 bits) | | # Vendor : https://www.gnu.org/software/inetutils/ | ============================================================================================================================================= [+] References : https://packetstorm.news/files/id/215519/ & CVE-2026-24061 [+] Summary : This PHP script is a PoC demonstrating a potential authentication bypass vulnerability in GNU Inetutils Telnet server identified as CVE-2026-24061. [+] The exploit works by: Establishing a TCP connection to the target Telnet service (default port 23). Crafting a malicious Telnet NEW-ENVIRON subnegotiation payload. Injecting a forged USER environment variable value. Attempting to manipulate the authentication process through improper handling of Telnet option negotiation. [+] The script: Connects to a specified host. Sends a specially crafted Telnet negotiation sequence. Attempts to bypass authentication by injecting -f root into the environment variable. Displays any response received from the target service. [+] POC : summary en titel Greetings to :====================================================================== jericho * Larry W. Cashdollar * r00t * Hussin-X * Malvuln (John Page aka hyp3rlinx)| ====================================================================================