


Perceptive Security
SOC/SIEM Consultancy

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to c…
Published:
16 March 2026 at 23:00:00
Alert date:
17 March 2026 at 19:03:08
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure, Critical Infrastructure
Sipeed NanoKVM devices before version 2.3.1 contain a critical vulnerability in their Wi-Fi configuration endpoint that lacks proper authentication and security controls. Unauthenticated attackers with network access can exploit this flaw to modify the device's Wi-Fi network configuration, potentially redirecting the device to attacker-controlled networks. Additionally, attackers can craft malicious requests to exhaust system memory and cause denial of service by terminating the KVM process. This vulnerability affects KVM-over-IP devices which are commonly used for remote server management, making it particularly dangerous for infrastructure security.
Technical details
Mitigation steps:
Affected products:
Sipeed NanoKVM
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32296
https://eclypsium.com/blog/kvm-devices-the-keys-to-your-kingdom-are-hanging-on-the-network/
https://github.com/sipeed/NanoKVM/blob/main/CHANGELOG.md#231-2025-12-26
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-076-01.json
https://www.cve.org/CVERecord?id=CVE-2026-32296
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
