jeffaf

CVE-2026-32746 - GNU InetUtils telnetd LINEMODE SLC Buffer Overflow PoC (pre-auth RCE, CVSS 9.8)

13
7
100% credibility
Found Mar 19, 2026 at 13 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

This project offers a safe lab setup, detection tool, and crash demonstration for a critical buffer overflow flaw in telnet login servers.

How It Works

1
🕵️ Discover the security demo

You hear about a tool that shows a serious flaw in old computer login services.

2
🏠 Start your safe practice area

You launch a private, contained playground on your computer to safely test the flaw without risks.

3
🔍 Safely check for the weakness

You point the checker at your practice service to confirm if it has the problem, without causing harm.

4
💥 Trigger the flaw demo

You send the special test message that makes the service crash, proving the weakness exists.

5
See the proof

You get clear signs like leaked info or service stoppage, verifying the demo worked.

📚 Learn about real risks

You now understand how such flaws can crash services and why updates matter, all in a safe space.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 13 to 13 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is cve-2026-32746?

This Python PoC targets CVE-2026-32746, a CVSS 9.8 critical buffer overflow in GNU Inetutils telnetd's LINEMODE SLC handler that enables pre-auth RCE. It lets you detect vulnerable telnet services without harm via option negotiation checks, trigger crashes to confirm the overflow, and spin up a Docker lab for safe testing on port 2323. Run simple CLI commands like `python3 detect.py host 23` or `python3 exploit.py host 23` to verify exposures before patches land in 2026.

Why is it gaining traction?

Unlike generic vuln scanners, it proves the overflow through leaked responses or service crashes, giving concrete evidence without full RCE chains. The one-command Docker lab isolates vulnerable inetutils-telnetd 2.4, perfect for repro without host risks. Developers dig the non-destructive detection mode for prod scanning and detailed output on LINEMODE support.

Who should use this?

Security researchers dissecting telnetd flaws, pentesters scanning legacy GNU Inetutils deployments for CVE-2026-32746, and red teams building RCE PoCs from the overflow primitive. Ideal for auditing exposed 23/tcp services or training on pre-auth buffer overflows in network daemons.

Verdict

Grab it if you're hunting this specific CVSS 9.8 vuln—solid docs and lab make it dead simple despite 13 stars and 1.0% credibility score signaling early maturity. Skip for broad vuln tools; it's a niche PoC, not production-ready.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.