Organizations Warned of Exploited Linux Vulnerabilities
- Jan 26
- 1 min read

An attacker can exploit the bug by sending crafted Telnet commands to set the USER variable, bypass authentication, and obtain a root shell, gaining remote code execution (RCE) on vulnerable systems, SafeBreach explains.
