PoC-in-GitHub/2026/CVE-2026-24061.json
2026-02-06 03:48:26 +09:00

1844 lines
No EOL
64 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 1013041336,
"name": "CVE-2026-24061-POC",
"full_name": "Good123321-bot\/CVE-2026-24061-POC",
"owner": {
"login": "Good123321-bot",
"id": 219110672,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/219110672?v=4",
"html_url": "https:\/\/github.com\/Good123321-bot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Good123321-bot\/CVE-2026-24061-POC",
"description": null,
"fork": false,
"created_at": "2025-07-03T09:13:14Z",
"updated_at": "2026-02-05T16:31:57Z",
"pushed_at": "2026-02-05T16:24:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2026-24061",
"exploit",
"poc",
"rce",
"root",
"telnet",
"telnet-exploit",
"telnet-server",
"telnetd-rce",
"unauthenticated-rce"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1138966777,
"name": "inetutils-telnetd-auth-bypass",
"full_name": "leonjza\/inetutils-telnetd-auth-bypass",
"owner": {
"login": "leonjza",
"id": 1148127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1148127?v=4",
"html_url": "https:\/\/github.com\/leonjza",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/leonjza\/inetutils-telnetd-auth-bypass",
"description": "A small docker lab to play with cve-2026-24061, the inetutils-telnetd authentication bypass.",
"fork": false,
"created_at": "2026-01-21T10:49:17Z",
"updated_at": "2026-02-01T10:27:35Z",
"pushed_at": "2026-01-22T09:25:30Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"auth",
"bypass",
"cve-2026-24061",
"telnet"
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 1139728682,
"name": "CVE-2026-24061---telnetd",
"full_name": "duy-31\/CVE-2026-24061---telnetd",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2026-24061---telnetd",
"description": "Bypass dauthentification Telnet menant à un accès root",
"fork": false,
"created_at": "2026-01-22T10:38:31Z",
"updated_at": "2026-01-25T09:55:09Z",
"pushed_at": "2026-01-25T09:55:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1139735177,
"name": "CVE-2026-24061",
"full_name": "TryA9ain\/CVE-2026-24061",
"owner": {
"login": "TryA9ain",
"id": 51145610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51145610?v=4",
"html_url": "https:\/\/github.com\/TryA9ain",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TryA9ain\/CVE-2026-24061",
"description": "CVE-2026-24061 Batch Scanning Tool",
"fork": false,
"created_at": "2026-01-22T10:48:22Z",
"updated_at": "2026-01-31T09:33:45Z",
"pushed_at": "2026-01-22T10:53:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 1139842961,
"name": "Tell-Me-Root",
"full_name": "parameciumzhang\/Tell-Me-Root",
"owner": {
"login": "parameciumzhang",
"id": 157633247,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157633247?v=4",
"html_url": "https:\/\/github.com\/parameciumzhang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/parameciumzhang\/Tell-Me-Root",
"description": "基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具",
"fork": false,
"created_at": "2026-01-22T13:44:54Z",
"updated_at": "2026-02-04T03:24:37Z",
"pushed_at": "2026-01-23T08:08:59Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 18,
"score": 0,
"subscribers_count": 0
},
{
"id": 1139869296,
"name": "CVE-2026-24061",
"full_name": "Chocapikk\/CVE-2026-24061",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-22T14:24:19Z",
"updated_at": "2026-02-03T04:10:08Z",
"pushed_at": "2026-01-22T15:15:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1139871873,
"name": "CVE-2026-24061-POC",
"full_name": "JayGLXR\/CVE-2026-24061-POC",
"owner": {
"login": "JayGLXR",
"id": 154396700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154396700?v=4",
"html_url": "https:\/\/github.com\/JayGLXR",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JayGLXR\/CVE-2026-24061-POC",
"description": null,
"fork": false,
"created_at": "2026-01-22T14:27:50Z",
"updated_at": "2026-02-04T09:27:38Z",
"pushed_at": "2026-01-22T14:33:43Z",
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 58,
"score": 0,
"subscribers_count": 0
},
{
"id": 1139928415,
"name": "CVE-2026-24061--telnetd",
"full_name": "yanxinwu946\/CVE-2026-24061--telnetd",
"owner": {
"login": "yanxinwu946",
"id": 72176308,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72176308?v=4",
"html_url": "https:\/\/github.com\/yanxinwu946",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yanxinwu946\/CVE-2026-24061--telnetd",
"description": "GNU InetUtils telnetd 远程身份认证绕过漏洞CVE-2026-24061此漏洞主要影响 telnetd 在调用系统 \/usr\/bin\/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。",
"fork": false,
"created_at": "2026-01-22T15:49:14Z",
"updated_at": "2026-02-04T06:09:42Z",
"pushed_at": "2026-01-26T15:07:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140031758,
"name": "CVE-2026-24061",
"full_name": "SafeBreach-Labs\/CVE-2026-24061",
"owner": {
"login": "SafeBreach-Labs",
"id": 19378730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19378730?v=4",
"html_url": "https:\/\/github.com\/SafeBreach-Labs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SafeBreach-Labs\/CVE-2026-24061",
"description": "Exploitation of CVE-2026-24061",
"fork": false,
"created_at": "2026-01-22T18:30:17Z",
"updated_at": "2026-02-05T07:59:25Z",
"pushed_at": "2026-01-22T19:37:20Z",
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 187,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140098827,
"name": "CVE-2026-24061",
"full_name": "h3athen\/CVE-2026-24061",
"owner": {
"login": "h3athen",
"id": 48544502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48544502?v=4",
"html_url": "https:\/\/github.com\/h3athen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/h3athen\/CVE-2026-24061",
"description": "CVE-2026-24061 - Exploit",
"fork": false,
"created_at": "2026-01-22T20:33:24Z",
"updated_at": "2026-01-28T18:35:51Z",
"pushed_at": "2026-01-22T20:39:11Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140236389,
"name": "CVE-2026-24061",
"full_name": "xuemian168\/CVE-2026-24061",
"owner": {
"login": "xuemian168",
"id": 38741078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38741078?v=4",
"html_url": "https:\/\/github.com\/xuemian168",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xuemian168\/CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-23T02:14:15Z",
"updated_at": "2026-02-04T14:16:18Z",
"pushed_at": "2026-01-23T02:30:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140261470,
"name": "CVE-2026-24061",
"full_name": "monstertsl\/CVE-2026-24061",
"owner": {
"login": "monstertsl",
"id": 39371736,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39371736?v=4",
"html_url": "https:\/\/github.com\/monstertsl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/monstertsl\/CVE-2026-24061",
"description": "CVE-2026-24061 漏洞检测工具",
"fork": false,
"created_at": "2026-01-23T03:16:53Z",
"updated_at": "2026-01-26T05:01:54Z",
"pushed_at": "2026-01-26T05:01:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140422310,
"name": "CVE-2026-24061",
"full_name": "r00tuser111\/CVE-2026-24061",
"owner": {
"login": "r00tuser111",
"id": 22544959,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22544959?v=4",
"html_url": "https:\/\/github.com\/r00tuser111",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r00tuser111\/CVE-2026-24061",
"description": "CVE-2026-24061 环境",
"fork": false,
"created_at": "2026-01-23T08:59:03Z",
"updated_at": "2026-01-23T09:03:49Z",
"pushed_at": "2026-01-23T09:03:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140546327,
"name": "CVE-2026-24061",
"full_name": "balgan\/CVE-2026-24061",
"owner": {
"login": "balgan",
"id": 1078950,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1078950?v=4",
"html_url": "https:\/\/github.com\/balgan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/balgan\/CVE-2026-24061",
"description": "inetutils-telnetd Authentication Bypass - working",
"fork": false,
"created_at": "2026-01-23T12:33:03Z",
"updated_at": "2026-01-23T12:36:42Z",
"pushed_at": "2026-01-23T12:36:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1140733735,
"name": "CVE-2026-24061",
"full_name": "SystemVll\/CVE-2026-24061",
"owner": {
"login": "SystemVll",
"id": 69421356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
"html_url": "https:\/\/github.com\/SystemVll",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SystemVll\/CVE-2026-24061",
"description": "Proof of Concept: CVE-2026-24061 is a critical authentication bypass vulnerability in GNU inetutils-telnetd allowing unauthenticated remote attackers to gain instant root shell access via malicious NEW_ENVIRON telnet option exploitation.",
"fork": false,
"created_at": "2026-01-23T17:26:43Z",
"updated_at": "2026-01-23T17:36:50Z",
"pushed_at": "2026-01-23T17:34:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"auth-bypass",
"cve",
"cve-2026-24061",
"cwe",
"exploit",
"flaw",
"nuclei",
"poc",
"proof-of-concept",
"telnet",
"telnetd"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141086666,
"name": "CVE-2026-24061",
"full_name": "z3n70\/CVE-2026-24061",
"owner": {
"login": "z3n70",
"id": 39817707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
"html_url": "https:\/\/github.com\/z3n70",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3n70\/CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-24T08:09:02Z",
"updated_at": "2026-01-24T08:16:10Z",
"pushed_at": "2026-01-24T08:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141216751,
"name": "CVE-2026-24061",
"full_name": "Mr-Zapi\/CVE-2026-24061",
"owner": {
"login": "Mr-Zapi",
"id": 163752247,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163752247?v=4",
"html_url": "https:\/\/github.com\/Mr-Zapi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mr-Zapi\/CVE-2026-24061",
"description": "Nuclei template for CVE-2026-24061",
"fork": false,
"created_at": "2026-01-24T13:18:54Z",
"updated_at": "2026-01-24T20:50:17Z",
"pushed_at": "2026-01-24T20:50:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141243311,
"name": "CVE-2026-24061",
"full_name": "midox008\/CVE-2026-24061",
"owner": {
"login": "midox008",
"id": 58739475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58739475?v=4",
"html_url": "https:\/\/github.com\/midox008",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/midox008\/CVE-2026-24061",
"description": "GNU Inetutils telnetd Remote Authentication Bypass",
"fork": false,
"created_at": "2026-01-24T14:15:05Z",
"updated_at": "2026-01-24T14:16:03Z",
"pushed_at": "2026-01-24T14:15:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141271916,
"name": "CVE-2026-24061",
"full_name": "BrainBob\/CVE-2026-24061",
"owner": {
"login": "BrainBob",
"id": 173798873,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173798873?v=4",
"html_url": "https:\/\/github.com\/BrainBob",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BrainBob\/CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-24T15:11:28Z",
"updated_at": "2026-01-24T15:46:05Z",
"pushed_at": "2026-01-24T15:46:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141295963,
"name": "Telnet-TestVuln-CVE-2026-24061",
"full_name": "BrainBob\/Telnet-TestVuln-CVE-2026-24061",
"owner": {
"login": "BrainBob",
"id": 173798873,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173798873?v=4",
"html_url": "https:\/\/github.com\/BrainBob",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BrainBob\/Telnet-TestVuln-CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-24T15:59:48Z",
"updated_at": "2026-01-24T16:06:34Z",
"pushed_at": "2026-01-24T16:06:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141353816,
"name": "CVE-2026-24061-POC",
"full_name": "cyberpoul\/CVE-2026-24061-POC",
"owner": {
"login": "cyberpoul",
"id": 143470757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143470757?v=4",
"html_url": "https:\/\/github.com\/cyberpoul",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyberpoul\/CVE-2026-24061-POC",
"description": "CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards.",
"fork": false,
"created_at": "2026-01-24T17:54:40Z",
"updated_at": "2026-02-05T01:21:54Z",
"pushed_at": "2026-01-26T13:04:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2026-24061",
"poc",
"rce",
"root",
"telnet",
"telnet-server",
"unauthenticated-rce"
],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141386138,
"name": "CVE-2026-24061-setup",
"full_name": "DeadlyHollows\/CVE-2026-24061-setup",
"owner": {
"login": "DeadlyHollows",
"id": 22254056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22254056?v=4",
"html_url": "https:\/\/github.com\/DeadlyHollows",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DeadlyHollows\/CVE-2026-24061-setup",
"description": "Docker setup for CVE-2026-24061",
"fork": false,
"created_at": "2026-01-24T19:03:06Z",
"updated_at": "2026-01-28T18:02:48Z",
"pushed_at": "2026-01-24T19:11:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141454492,
"name": "Twenty-Three-Scanner",
"full_name": "madfxr\/Twenty-Three-Scanner",
"owner": {
"login": "madfxr",
"id": 30550561,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30550561?v=4",
"html_url": "https:\/\/github.com\/madfxr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/madfxr\/Twenty-Three-Scanner",
"description": "CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypass",
"fork": false,
"created_at": "2026-01-24T21:47:29Z",
"updated_at": "2026-01-31T00:49:56Z",
"pushed_at": "2026-01-31T00:49:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2026-24061",
"ethical-hacking",
"exploit",
"gnu",
"inetutils",
"linux",
"offensive-security",
"poc",
"python",
"rce",
"red-team",
"telnetd"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141488910,
"name": "CVE-2026-24061-POC",
"full_name": "Alter-N0X\/CVE-2026-24061-POC",
"owner": {
"login": "Alter-N0X",
"id": 213219473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/213219473?v=4",
"html_url": "https:\/\/github.com\/Alter-N0X",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Alter-N0X\/CVE-2026-24061-POC",
"description": "CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing ",
"fork": false,
"created_at": "2026-01-24T23:21:56Z",
"updated_at": "2026-01-25T10:03:13Z",
"pushed_at": "2026-01-24T23:27:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141663043,
"name": "CVE-2026-24061",
"full_name": "typeconfused\/CVE-2026-24061",
"owner": {
"login": "typeconfused",
"id": 138196270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138196270?v=4",
"html_url": "https:\/\/github.com\/typeconfused",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/typeconfused\/CVE-2026-24061",
"description": "GNU telnetd service from GNU InetUtils authentication-bypass",
"fork": false,
"created_at": "2026-01-25T07:33:48Z",
"updated_at": "2026-01-25T07:35:06Z",
"pushed_at": "2026-01-25T07:35:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141692144,
"name": "Ashwesker-CVE-2026-24061",
"full_name": "Mefhika120\/Ashwesker-CVE-2026-24061",
"owner": {
"login": "Mefhika120",
"id": 257077128,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/257077128?v=4",
"html_url": "https:\/\/github.com\/Mefhika120",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mefhika120\/Ashwesker-CVE-2026-24061",
"description": "CVE-2026-24061",
"fork": false,
"created_at": "2026-01-25T08:51:17Z",
"updated_at": "2026-01-25T08:51:17Z",
"pushed_at": "2026-01-23T07:47:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141735351,
"name": "CVE-2026-24061",
"full_name": "infat0x\/CVE-2026-24061",
"owner": {
"login": "infat0x",
"id": 107745461,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107745461?v=4",
"html_url": "https:\/\/github.com\/infat0x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/infat0x\/CVE-2026-24061",
"description": "CVE-2026-24061 PoC",
"fork": false,
"created_at": "2026-01-25T10:40:00Z",
"updated_at": "2026-01-25T19:13:39Z",
"pushed_at": "2026-01-25T10:45:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141991089,
"name": "CVE-2026-24061-POC",
"full_name": "ms0x08-dev\/CVE-2026-24061-POC",
"owner": {
"login": "ms0x08-dev",
"id": 10129407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10129407?v=4",
"html_url": "https:\/\/github.com\/ms0x08-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ms0x08-dev\/CVE-2026-24061-POC",
"description": null,
"fork": false,
"created_at": "2026-01-25T19:22:38Z",
"updated_at": "2026-01-25T19:42:03Z",
"pushed_at": "2026-01-25T19:42:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1142208769,
"name": "telnetd-cve-2026-24061",
"full_name": "punitdarji\/telnetd-cve-2026-24061",
"owner": {
"login": "punitdarji",
"id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/punitdarji\/telnetd-cve-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-26T05:05:24Z",
"updated_at": "2026-01-26T05:08:59Z",
"pushed_at": "2026-01-26T05:08:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1142283613,
"name": "CVE-2026-24061-Scanner",
"full_name": "XsanFlip\/CVE-2026-24061-Scanner",
"owner": {
"login": "XsanFlip",
"id": 192573173,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192573173?v=4",
"html_url": "https:\/\/github.com\/XsanFlip",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XsanFlip\/CVE-2026-24061-Scanner",
"description": "CVE-2026-24061-Scanner by XsanLahci",
"fork": false,
"created_at": "2026-01-26T07:47:36Z",
"updated_at": "2026-01-26T08:21:02Z",
"pushed_at": "2026-01-26T08:20:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1142358914,
"name": "CVE-2026-24061-GUI",
"full_name": "Lingzesec\/CVE-2026-24061-GUI",
"owner": {
"login": "Lingzesec",
"id": 125247408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125247408?v=4",
"html_url": "https:\/\/github.com\/Lingzesec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lingzesec\/CVE-2026-24061-GUI",
"description": "CVE-2026-24061 GNU Inetutils telnetd 身份验证绕过漏洞检测与利用 GUI 工具",
"fork": false,
"created_at": "2026-01-26T09:58:04Z",
"updated_at": "2026-02-03T05:21:18Z",
"pushed_at": "2026-01-28T02:28:40Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"score": 0,
"subscribers_count": 0
},
{
"id": 1142770099,
"name": "CVE-2026-24061",
"full_name": "LucasPDiniz\/CVE-2026-24061",
"owner": {
"login": "LucasPDiniz",
"id": 57265360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
"html_url": "https:\/\/github.com\/LucasPDiniz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2026-24061",
"description": "Vulnerability in GNU InetUtils telnetd Enables Remote Root Access",
"fork": false,
"created_at": "2026-01-26T20:46:49Z",
"updated_at": "2026-01-27T05:50:02Z",
"pushed_at": "2026-01-27T05:49:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2026-24061",
"inetutils",
"root"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1143158630,
"name": "CVE-2026-24061-telnet2root",
"full_name": "FurkanKAYAPINAR\/CVE-2026-24061-telnet2root",
"owner": {
"login": "FurkanKAYAPINAR",
"id": 5401590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5401590?v=4",
"html_url": "https:\/\/github.com\/FurkanKAYAPINAR",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FurkanKAYAPINAR\/CVE-2026-24061-telnet2root",
"description": null,
"fork": false,
"created_at": "2026-01-27T08:32:42Z",
"updated_at": "2026-01-27T19:04:20Z",
"pushed_at": "2026-01-27T08:39:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1143391754,
"name": "CVE-2026-24061-PoC-Telnetd",
"full_name": "androidteacher\/CVE-2026-24061-PoC-Telnetd",
"owner": {
"login": "androidteacher",
"id": 2923106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2923106?v=4",
"html_url": "https:\/\/github.com\/androidteacher",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/androidteacher\/CVE-2026-24061-PoC-Telnetd",
"description": null,
"fork": false,
"created_at": "2026-01-27T14:24:19Z",
"updated_at": "2026-01-27T15:20:44Z",
"pushed_at": "2026-01-27T15:20:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1143565832,
"name": "tscan",
"full_name": "cumakurt\/tscan",
"owner": {
"login": "cumakurt",
"id": 91676004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91676004?v=4",
"html_url": "https:\/\/github.com\/cumakurt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cumakurt\/tscan",
"description": "Telnetd Auth Bypass Scanner (CVE-2026-24061) A Python-based scanner for detecting and exploiting the CVE-2026-24061 vulnerability in GNU Inetutils telnetd services. This tool scans IP addresses or networks for vulnerable telnetd services that allow authentication bypass leading to root shell access.",
"fork": false,
"created_at": "2026-01-27T18:30:07Z",
"updated_at": "2026-01-27T18:50:43Z",
"pushed_at": "2026-01-27T18:50:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2026-24061",
"scanner",
"telnet",
"telnet-server"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1143622792,
"name": "Exploit-CVE-2026-24061",
"full_name": "novitahk\/Exploit-CVE-2026-24061",
"owner": {
"login": "novitahk",
"id": 60710201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60710201?v=4",
"html_url": "https:\/\/github.com\/novitahk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/novitahk\/Exploit-CVE-2026-24061",
"description": "Payload CVE-2026-24061",
"fork": false,
"created_at": "2026-01-27T20:04:40Z",
"updated_at": "2026-01-27T20:15:07Z",
"pushed_at": "2026-01-27T20:15:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1143759834,
"name": "CVE-2026-24061_Lab",
"full_name": "Gabs-hub\/CVE-2026-24061_Lab",
"owner": {
"login": "Gabs-hub",
"id": 161517615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161517615?v=4",
"html_url": "https:\/\/github.com\/Gabs-hub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gabs-hub\/CVE-2026-24061_Lab",
"description": "Lab to show the CVE-2026-24061",
"fork": false,
"created_at": "2026-01-28T00:27:09Z",
"updated_at": "2026-01-28T00:41:23Z",
"pushed_at": "2026-01-28T00:27:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1143844756,
"name": "GNU-Inetutils-telnet-CVE-2026-24061-",
"full_name": "MY0723\/GNU-Inetutils-telnet-CVE-2026-24061-",
"owner": {
"login": "MY0723",
"id": 74171727,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74171727?v=4",
"html_url": "https:\/\/github.com\/MY0723",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MY0723\/GNU-Inetutils-telnet-CVE-2026-24061-",
"description": "GNU Inetutils telnet远程认证绕过漏洞(CVE-2026-24061),该漏洞源于 GNU Inetutils telnetd 组件中对环境变量处理不当,攻击者可利用该漏洞,通过构造恶意的 USER 环境变量并发送至受影响的 telnet 服务触发认证绕过机制进而实现无需密码直接获取root权限。",
"fork": false,
"created_at": "2026-01-28T02:54:23Z",
"updated_at": "2026-01-28T03:02:40Z",
"pushed_at": "2026-01-28T03:02:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1144002432,
"name": "CVE-2026-24061",
"full_name": "hilwa24\/CVE-2026-24061",
"owner": {
"login": "hilwa24",
"id": 247743740,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/247743740?v=4",
"html_url": "https:\/\/github.com\/hilwa24",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hilwa24\/CVE-2026-24061",
"description": "Tell Me Root (Batch Scanning Tool for the CVE-2026-24061 Telnet Authentication Bypass)",
"fork": false,
"created_at": "2026-01-28T07:05:56Z",
"updated_at": "2026-01-28T07:28:00Z",
"pushed_at": "2026-01-28T07:12:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2026-24061",
"telnetd-rce"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1144297047,
"name": "CVE-2026-24061",
"full_name": "0x7556\/CVE-2026-24061",
"owner": {
"login": "0x7556",
"id": 50582207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50582207?v=4",
"html_url": "https:\/\/github.com\/0x7556",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x7556\/CVE-2026-24061",
"description": "CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows",
"fork": false,
"created_at": "2026-01-28T14:35:20Z",
"updated_at": "2026-01-28T14:46:46Z",
"pushed_at": "2026-01-28T14:43:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1144345797,
"name": "CVE-2026-24061",
"full_name": "Parad0x7e\/CVE-2026-24061",
"owner": {
"login": "Parad0x7e",
"id": 107104425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107104425?v=4",
"html_url": "https:\/\/github.com\/Parad0x7e",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Parad0x7e\/CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-01-28T15:41:27Z",
"updated_at": "2026-01-28T15:57:22Z",
"pushed_at": "2026-01-28T15:46:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1144639519,
"name": "telnetd_CVE-2026-24061_tester",
"full_name": "dotelpenguin\/telnetd_CVE-2026-24061_tester",
"owner": {
"login": "dotelpenguin",
"id": 11744986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11744986?v=4",
"html_url": "https:\/\/github.com\/dotelpenguin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dotelpenguin\/telnetd_CVE-2026-24061_tester",
"description": "Checks for CVE-2026-24061 Telnetd exploit",
"fork": false,
"created_at": "2026-01-28T22:03:09Z",
"updated_at": "2026-01-29T17:16:33Z",
"pushed_at": "2026-01-28T22:38:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1146350782,
"name": "telnet-inetutils-auth-bypass-CVE-2026-24061",
"full_name": "0xXyc\/telnet-inetutils-auth-bypass-CVE-2026-24061",
"owner": {
"login": "0xXyc",
"id": 42036798,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42036798?v=4",
"html_url": "https:\/\/github.com\/0xXyc",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xXyc\/telnet-inetutils-auth-bypass-CVE-2026-24061",
"description": "This is a simple PoC that allows you to highlight the severity of the ongoing and actively exploited Telnet bug that is going on right now. Why people are still using Telnet... beyond me.",
"fork": false,
"created_at": "2026-01-31T00:41:11Z",
"updated_at": "2026-01-31T00:43:12Z",
"pushed_at": "2026-01-31T00:43:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1146360267,
"name": "CVE-2026-24061",
"full_name": "buzz075\/CVE-2026-24061",
"owner": {
"login": "buzz075",
"id": 139185174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139185174?v=4",
"html_url": "https:\/\/github.com\/buzz075",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/buzz075\/CVE-2026-24061",
"description": "Scanner for CVE-2026-24061",
"fork": false,
"created_at": "2026-01-31T01:10:23Z",
"updated_at": "2026-01-31T01:13:37Z",
"pushed_at": "2026-01-31T01:13:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1147490725,
"name": "CVE-2026-24061_POC",
"full_name": "X-croot\/CVE-2026-24061_POC",
"owner": {
"login": "X-croot",
"id": 219624836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/219624836?v=4",
"html_url": "https:\/\/github.com\/X-croot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/X-croot\/CVE-2026-24061_POC",
"description": "POC Script for CVE-2026-24061 (GNU Telnetd Exploit) ",
"fork": false,
"created_at": "2026-02-01T20:32:26Z",
"updated_at": "2026-02-02T05:11:13Z",
"pushed_at": "2026-02-01T21:01:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2026-24061",
"exploit",
"poc",
"telnet-exploit",
"telnetd-rce"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1147892492,
"name": "CVE_2026_24061_PoC",
"full_name": "franckferman\/CVE_2026_24061_PoC",
"owner": {
"login": "franckferman",
"id": 73023545,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73023545?v=4",
"html_url": "https:\/\/github.com\/franckferman",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/franckferman\/CVE_2026_24061_PoC",
"description": "Native Python Exploit & Mass Scanner for CVE-2026-24061 (GNU InetUtils Telnetd). Bypasses authentication via NEW-ENVIRON injection (USER=-f root) to get immediate root shell. Features parallel scanning (CIDR support) and robust result logging.",
"fork": false,
"created_at": "2026-02-02T10:30:25Z",
"updated_at": "2026-02-02T14:52:15Z",
"pushed_at": "2026-02-02T14:47:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2026-24061",
"telnet-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148243886,
"name": "CVE--2026-24061",
"full_name": "SeptembersEND\/CVE--2026-24061",
"owner": {
"login": "SeptembersEND",
"id": 245081947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/245081947?v=4",
"html_url": "https:\/\/github.com\/SeptembersEND",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SeptembersEND\/CVE--2026-24061",
"description": "A docker image for CVE-2026-24061 in InetUtils telnetd.",
"fork": false,
"created_at": "2026-02-02T18:36:56Z",
"updated_at": "2026-02-02T22:12:45Z",
"pushed_at": "2026-02-02T19:56:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148398832,
"name": "CVE-2026-24061-PoC",
"full_name": "ibrahmsql\/CVE-2026-24061-PoC",
"owner": {
"login": "ibrahmsql",
"id": 216335158,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/216335158?v=4",
"html_url": "https:\/\/github.com\/ibrahmsql",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ibrahmsql\/CVE-2026-24061-PoC",
"description": "CVE-2026-24061 PoC and walkthrough",
"fork": false,
"created_at": "2026-02-02T23:20:01Z",
"updated_at": "2026-02-03T14:56:23Z",
"pushed_at": "2026-02-02T23:31:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148580454,
"name": "good123321-bot.github.io",
"full_name": "Good123321-bot\/good123321-bot.github.io",
"owner": {
"login": "Good123321-bot",
"id": 219110672,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/219110672?v=4",
"html_url": "https:\/\/github.com\/Good123321-bot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Good123321-bot\/good123321-bot.github.io",
"description": "🔐 Exploit the GNU inetutils-telnetd authentication bypass vulnerability (CVE-2026-24061) to demonstrate remote login without credentials.",
"fork": false,
"created_at": "2026-02-03T05:57:03Z",
"updated_at": "2026-02-03T05:57:53Z",
"pushed_at": "2026-02-03T05:57:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148619445,
"name": "Tell-Me-Root",
"full_name": "Moxxic1\/Tell-Me-Root",
"owner": {
"login": "Moxxic1",
"id": 131405169,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131405169?v=4",
"html_url": "https:\/\/github.com\/Moxxic1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Moxxic1\/Tell-Me-Root",
"description": "🔍 Automate bulk detection of the CVE-2026-24061 Telnet authentication bypass vulnerability using this lightweight Python tool.",
"fork": false,
"created_at": "2026-02-03T07:03:26Z",
"updated_at": "2026-02-05T16:24:15Z",
"pushed_at": "2026-02-05T16:24:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-completion",
"form-builder",
"front-end",
"google-forms",
"gpt",
"mscoco-image-dataset",
"multi-agent",
"secret-management",
"secrets",
"semantic-engine",
"show-attend-and-tell",
"telethon-bot",
"telnetd-rce",
"vault",
"vim"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148623043,
"name": "moxxic1.github.io",
"full_name": "Moxxic1\/moxxic1.github.io",
"owner": {
"login": "Moxxic1",
"id": 131405169,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131405169?v=4",
"html_url": "https:\/\/github.com\/Moxxic1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Moxxic1\/moxxic1.github.io",
"description": "🔍 Scan networks for CVE-2026-24061 vulnerabilities with this lightweight Python tool, enabling quick and easy batch detection of telnet authentication bypass.",
"fork": false,
"created_at": "2026-02-03T07:09:12Z",
"updated_at": "2026-02-03T07:09:44Z",
"pushed_at": "2026-02-03T07:09:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1149163272,
"name": "CVE-2026-24061",
"full_name": "obrunolima1910\/CVE-2026-24061",
"owner": {
"login": "obrunolima1910",
"id": 137207175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137207175?v=4",
"html_url": "https:\/\/github.com\/obrunolima1910",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/obrunolima1910\/CVE-2026-24061",
"description": "🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.",
"fork": false,
"created_at": "2026-02-03T19:46:10Z",
"updated_at": "2026-02-05T16:25:00Z",
"pushed_at": "2026-02-05T16:24:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"agent",
"auth",
"book",
"computer-vision",
"cv",
"deep-learning",
"gluon",
"image-classification",
"jupyter-notebook",
"machine-learning",
"mxnet",
"neural-network",
"person-reid",
"pose-estimation",
"root",
"semantic-segmentation",
"telnet"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1149164986,
"name": "obrunolima1910.github.io",
"full_name": "obrunolima1910\/obrunolima1910.github.io",
"owner": {
"login": "obrunolima1910",
"id": 137207175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137207175?v=4",
"html_url": "https:\/\/github.com\/obrunolima1910",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/obrunolima1910\/obrunolima1910.github.io",
"description": "🔍 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.",
"fork": false,
"created_at": "2026-02-03T19:48:55Z",
"updated_at": "2026-02-03T19:49:34Z",
"pushed_at": "2026-02-03T19:49:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1150009382,
"name": "telnet-CVE-2026-24061",
"full_name": "lavabyte\/telnet-CVE-2026-24061",
"owner": {
"login": "lavabyte",
"id": 138317871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138317871?v=4",
"html_url": "https:\/\/github.com\/lavabyte",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lavabyte\/telnet-CVE-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-02-04T19:22:29Z",
"updated_at": "2026-02-04T19:57:01Z",
"pushed_at": "2026-02-04T19:56:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1150066721,
"name": "inetutils-telnetd-cve-2026-24061",
"full_name": "canpilayda\/inetutils-telnetd-cve-2026-24061",
"owner": {
"login": "canpilayda",
"id": 165958127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165958127?v=4",
"html_url": "https:\/\/github.com\/canpilayda",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/canpilayda\/inetutils-telnetd-cve-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-02-04T20:59:41Z",
"updated_at": "2026-02-04T21:08:39Z",
"pushed_at": "2026-02-04T21:08:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1150709517,
"name": "scan-cve-2026-24061",
"full_name": "killsystema\/scan-cve-2026-24061",
"owner": {
"login": "killsystema",
"id": 11667300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11667300?v=4",
"html_url": "https:\/\/github.com\/killsystema",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/killsystema\/scan-cve-2026-24061",
"description": null,
"fork": false,
"created_at": "2026-02-05T15:47:03Z",
"updated_at": "2026-02-05T16:06:55Z",
"pushed_at": "2026-02-05T16:00:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]