Human
Machine
REPRO-2026-00077 CRITICAL Auth Bypass
Verified
GNU InetUtils telnetd Remote Authentication Bypass
inetutils (gnu) Jan 21, 2026
What's the vulnerability?
GNU InetUtils telnetd versions 1.9.3 through 2.7 accept the USER environment variable from telnet clients and pass it directly to login(1) without sanitization.
Root Cause Analysis
One Command
Verify with pruva-verify
Run the Pruva CLI to automatically fetch and execute the reproduction script.
pruva-verify REPRO-2026-00077 Install:
curl -fsSL https://pruva.dev/install.sh | sh Or Run Manually
1
Download the script
curl -O https://pruva.dev/api/v1/reproductions/REPRO-2026-00077/artifacts/bundle/repro/reproduction_steps.sh 2
Make executable
chmod +x reproduction_steps.sh 3
Run the script
./reproduction_steps.sh Run in a VM, container, or disposable environment. This exploits a real vulnerability.
How Pruva Reproduced This
Watch the AI agent's step-by-step process.
Loading session...