Just a reminder that #Telnet is never secure nor safe to use.

#SSH or something with a secure layer is so much better.

https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/

Nearly 800,000 Telnet servers exposed to remote attacks

Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils telnetd server.

BleepingComputer

Nearly 800,000 #Telnet servers exposed to remote attacks

The security flaw (CVE-2026-24061) already has a proof-of-concept exploit, impacts GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8 (released on January 20).

https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/

Nearly 800,000 Telnet servers exposed to remote attacks

Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils telnetd server.

BleepingComputer
Places to Telnet | telnet.org

"The text based internet can be exciting, informative, and fun. Using telnet, you can access a variety of these resources on the internet. Below you’ll find lists of a few places to get you started."

https://telnet.org/htm/places.htm

#telnet #tui
Places to Telnet

A list of fun destinations for telnet

telnet.org

Warning: computer nerd stuff below:

So. In 2026, telnet is still a thing.
Really? 😑

ubuntu@ubuntu:~$ USER=“-f root” telnet -a victim.ip.address

[usual Ubuntu /etc/issue text]

root@ubuntu:~# id
uid=0(root) gid=0(root) groups=0(root)

You’re welcome.

#itsecurity #unix #linux #telnet #telnetd

🚨 Critical #Telnet Authentication Bypass Vulnerability Discovered #CVE202624061 #cybersecurity #infosec #DevOps #security

🔓 #GNU Inetutils telnetd through version 2.7 allows remote authentication bypass via "-f root" USER environment variable

⚡ The exploit is shockingly simple: attackers send "-f root" as the USER value, triggering /usr/bin/login -f root which skips password authentication entirely

🧵 👇

🎯 Nearly 800,000 #Telnet servers potentially affected worldwide running vulnerable GNU inet utils implementations

📅 Bug existed since 2015 code changes, finally patched January 20, 2026 in version 2.8

🔧 The flaw stems from missing input sanitization: USER environment variable from network is passed unsanitized to login command, allowing flag injection

Places to Telnet

A list of fun destinations for telnet

telnet.org
📢 Exploitation en cours d’une faille critique dans GNU InetUtils telnetd; Shadowserver suit ~800 000 IP Telnet
📝 Selon Shadowserver, un organisme de veille...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-26-exploitation-en-cours-dune-faille-critique-dans-gnu-inetutils-telnetd-shadowserver-suit-800-000-ip-telnet/
🌐 source : https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/
#GNU_InetUtils_telnetd #Telnet #Cyberveille

The orange site shared this link, telnet.org which has a list of servers to which you can connect over Telnet. (Warning: these are always unencrypted connections).

If you want a Telnet-like experience but over a secure #TLS connection (e.g. using an #SSH client), check out the “Tildeverse,” https://tildeverse.org/ , a list of public-access servers with SSH login. It is like the #Fediverse but using TLS rather than the #ActivityPub protocol. The obvious drawback is that you need to know how to use a command line, but I doubt that would bother most Fediverse dwellers.

@screwlisp I didn’t see https://lambda.moo.mud.org at all in this list of Telnet logins. We may need to do something about that.

#tech #Internet #RetroComputing #Telnet #TildeVerse

Places to Telnet

A list of fun destinations for telnet

telnet.org