inetutils-telnetd-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

AnomalySecurityMalware
AnomalyLOW
references/cve-2026-32746-slc-overflow.md

This module is a targeted Telnet vulnerability probing/exploitation-style harness: it intentionally sends oversized LINEMODE SLC subnegotiation data to trigger CVE-2026-32746 on vulnerable telnetd servers and then infers vulnerability by comparing echoed SLC bytes. It does not show typical supply-chain malware behaviors (no theft, persistence, exfiltration, or stealth), but it is security-sensitive because it can actively exploit/possibly crash vulnerable targets when executed, making inclusion/execution in an automated pipeline high risk.

Confidence: 74%Severity: 66%
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill is internally consistent with its stated purpose, but that purpose is offensive exploitation: it gives an AI agent actionable instructions to find vulnerable telnetd servers, attempt auth bypass, and potentially obtain a root shell. There is little supply-chain evidence of malware, but the operational security risk is high because it equips the agent for remote attacks against real systems.

Confidence: 92%Severity: 88%
MalwareHIGH
references/cve-2026-24061-auth-bypass.md

The provided fragment is clearly offensive exploit material that enables remote authentication bypass and root-level command execution against a specific telnetd implementation by abusing the USER environment variable (USER="-f root") and telnet auto-login. It includes explicit sensitive-file reading and reverse-shell payload examples, and it uses local shell execution (subprocess with shell=True) to drive the attack and verify success. Treat as highly malicious; not safe to include as part of any supply chain dependency.

Confidence: 92%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Finetutils-telnetd-exploit%2F@a894ca7a62bbe1a1bb992f815e8b9561ce2b10ec