The vulnerability is caused due to a boundary error while reading Telnet IAC. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted telnet IAC to the affected server.
CVE Link
Exploit Platform
Product Name