Jump to the main content block

【Vulnerability Alert】 GNU Inetutils Telnetd Contains a High-Risk Security Vulnerability (CVE-2026-32746); Please Confirm and Apply the Patch as Soon as Possible

publish date : 2026-04-10 update date : 2026-04-10

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026040901044848 Publication Time 2026/04/09 13:20
Incident Type ANA-Vulnerability Alert Discovery Time 2026/04/09 13:20
Impact Level Medium  
[Subject]
【Vulnerability Alert】 GNU Inetutils Telnetd Contains a High-Risk Security Vulnerability (CVE-2026-32746); Please Confirm and Apply the Patch as Soon as Possible
[Content]
Forwarded from the National Institute of Cyber Security NISAC-200-202604-00000001

Researchers have discovered that GNU Inetutils Telnetd contains a Buffer Overflow vulnerability (CVE-2026-32746). An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code. Please confirm and apply the patch as soon as possible.

(Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]

GNU Inetutils Telnetd version 2.7 and earlier (inclusive)

[Recommended Actions]

It is recommended that all devices or systems stop using the Telnet service, and proceed with the update only after the vendor releases a patched version.

[Reference]
https://nvd.nist.gov/vuln/detail/CVE-2026-32746
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: