Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process. | |
| Title | Sipeed NanoKVM unauthenticated Wi-Fi configuration endpoint | |
| Weaknesses | CWE-306 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-03-17T18:10:26.448Z
Reserved: 2026-03-11T18:26:54.750Z
Link: CVE-2026-32296
Updated: 2026-03-17T18:10:23.448Z
Status : Received
Published: 2026-03-17T18:16:16.960
Modified: 2026-03-17T18:16:16.960
Link: CVE-2026-32296
No data.