top of page
perceptive_background_267k.jpg

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to c…

Published:

16 March 2026 at 23:00:00

Alert date:

17 March 2026 at 19:03:08

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Network Infrastructure, Critical Infrastructure

Sipeed NanoKVM devices before version 2.3.1 contain a critical vulnerability in their Wi-Fi configuration endpoint that lacks proper authentication and security controls. Unauthenticated attackers with network access can exploit this flaw to modify the device's Wi-Fi network configuration, potentially redirecting the device to attacker-controlled networks. Additionally, attackers can craft malicious requests to exhaust system memory and cause denial of service by terminating the KVM process. This vulnerability affects KVM-over-IP devices which are commonly used for remote server management, making it particularly dangerous for infrastructure security.

Technical details

Mitigation steps:

Affected products:

Sipeed NanoKVM

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page