Home

Description

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-17 | Updated 2026-03-17 | Assigner cisa-cg




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

Any version before 2.3.1
affected

2.3.1
unaffected

Credits

Reynaldo Vasquez Garcia, Eclypsium

References

github.com/sipeed/NanoKVM/blob/main/CHANGELOG.md (url) patch

eclypsium.com/...to-your-kingdom-are-hanging-on-the-network/ (url)

raw.githubusercontent.com/...IT/white/2025/va-26-076-01.json (url)

www.cve.org/CVERecord?id=CVE-2026-32296 (url)

cve.org (CVE-2026-32296)

nvd.nist.gov (CVE-2026-32296)

Download JSON