Overview
- GNU
- Inetutils
Description
Statistics
- 7 Posts
- 59 Interactions
Fediverse
We caught a few (desperate) fiends trying to have their way with our vulnerable-to Telnetd -f Auth Bypass vuln (CVE-2026-24061) systems and I took a spelunk in the PCAPs:
Some of the least clever and least capable actors I've seen in a while.
"-f Around and Find Out: 18 Hours of Unsolicited Telnet Houseguests “ takes you on a deep dive into the packets.
cc: @darses
Trollolol, telnetd lets you log in without a password if you send the USER environment variable as "-f root" (which gets passed unsanitized to login(1)).
(Yes, yes, telnet, but still. :-)
https://www.openwall.com/lists/oss-security/2026/01/20/2
CVE-2026-24061
There is a critical auth bypass vulnerability in telnetd (https://nvd.nist.gov/vuln/detail/CVE-2026-24061) so I will need to update the surl-server Apple II proxy image. It has telnetd enabled (on localhost only, so is only accessible via the Apple II's serial port and you're probably already root on it)
I shot a 📄 to the team to 👀 later today but we've seen some activity on the recent Inetutils Telnetd -f Auth Bypass vuln (CVE-2026-24061) — https://viz.greynoise.io/tags/inetutils-telnetd--f-auth-bypass-attempt?days=30
We stood up some full vulnerable systems and a cpl IPs only hit those, so the targeting precision was oddly fast.
If they don't do a main GN blog I'll post deets on the Labs blog (I'm OOO today).
Rly glad this was a nothingburger.
Spidey-sense says something yuge (not related to this) is coming soon tho. The internet feels “off”.
#telnet: Critical telnetd #Vulnerability CVE-2026-24061 Lets Attackers Bypass Login and Gain Root Access on systems running GNU InetUtils since version 1.9.3 up to and including version 2.7.
The vulnerability went unnoticed for nearly 11 years.
👇
https://thehackernews.com/2026/01/critical-gnu-inetutils-telnetd-flaw.html
Bluesky
Overview
Description
Statistics
- 9 Posts
- 10 Interactions
Fediverse
CVE-2025-59718 – Des firewalls FortiGate piratés malgré l’installation des derniers patchs https://www.it-connect.fr/cve-2025-59718-des-firewalls-fortigate-pirates-malgre-linstallation-des-derniers-patchs/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
Fortinet FortiGate admins are observing exploitation patterns consistent with CVE-2025-59718 even on patched systems, suggesting incomplete mitigation in earlier updates.
Reports include SSO-based admin creation and activity aligned with previously documented attacks. Additional FortiOS releases are expected.
The situation reinforces the need for defense-in-depth around identity, logging, and privileged access.
Follow @technadu for neutral, operationally focused security reporting.
#Infosec #Fortinet #FirewallSecurity #IAM #VulnerabilityManagement #TechNadu
New Blogpost: Look at FortiCloud SSO Bypass Exploitation (CVE-2025-59718/59719)
https://www.cert.at/en/blog/2026/1/look-at-forticloud-sso-bypass-exploitation
Kritische Schwachstellen (CVE-2025-59718, CVE-2025-59719) in Fortinet Firewall-Systemen ermöglichen entfernten Angreifenden, eine Authentifizierung mittels FortiCloud SSO zu umgehend und darüber administrativen Zugriff auf die Konfiguration der Firewall-Systeme zu erlangen.
Berichten zufolge werden aktuell in größerem Umfang weiterhin Fortinet-Firewalls kompromittiert, da die am 09.12.2025 zur Verfügung gestellten Patches die Schwachstelle nicht vollständig schließen.
Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).
( https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ )
Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).
Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.
Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.
[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
Bluesky
Overview
- Enhancesoft
- osTicket
Description
Statistics
- 4 Posts
- 9 Interactions
Fediverse
Die Schwachstelle CVE-2026-22200 in der Default-Konfiguration des Open-Source Ticket-Systems "osTicket" kann von entfernten Angreifenden durch Übermittlung eines speziell präparierten Tickets ausgenutzt werden, um ggf. sensible Daten aus dem Dateisystem des Servers auszuspähen.
Betroffen sind die Versionen 1.17.x < 1.17.7 und 1.18.x < 1.18.3.
CERT-Bund informiert deutsche Netzbetreiber ab heute zu verwundbaren Systemen in ihren Netzen. Aktuell sind uns rund 250 betroffene Systeme bekannt.
Helpdesk prints your secrets as art: smuggle a php:// filter into a ticket, export PDF, peel the BMP, win the salt, forge every link. Patch? That’s just the receipt.
https://horizon3.ai/attack-research/attack-blogs/ticket-to-shell-exploiting-php-filters-and-cnext-in-osticket-cve-2026-22200/
https://horizon3.ai/attack-research/attack-blogs/ticket-to-shell-exploiting-php-filters-and-cnext-in-osticket-cve-2026-22200/
Overview
Description
Statistics
- 4 Posts
Bluesky
Overview
- Fortinet
- FortiWeb
Description
Statistics
- 3 Posts
- 10 Interactions
Fediverse
Kritische Schwachstellen (CVE-2025-59718, CVE-2025-59719) in Fortinet Firewall-Systemen ermöglichen entfernten Angreifenden, eine Authentifizierung mittels FortiCloud SSO zu umgehend und darüber administrativen Zugriff auf die Konfiguration der Firewall-Systeme zu erlangen.
Berichten zufolge werden aktuell in größerem Umfang weiterhin Fortinet-Firewalls kompromittiert, da die am 09.12.2025 zur Verfügung gestellten Patches die Schwachstelle nicht vollständig schließen.
Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).
( https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ )
Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).
Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.
Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.
[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
🔴 CVE-2025-69766 - Critical (9.8)
Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- choijun
- LA-Studio Element Kit for Elementor
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
🔴 CVE-2026-0920 - Critical (9.8)
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
https://exploit.az/posts/wor/
CVE-2025-48941
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
🟠 CVE-2025-13928 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13928/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack