Programs of this type act as a telnet server. They are sometimes included by malicious users in bundles of malicious programs in order to gain access to a victim computer. These programs are not malicious.
If a user has installed such a program on his/her computer, or if it was installed by a system administrator, then it does not pose any threat.