Vulnerability Description
Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://eclypsium.com/blog/kvm-devices-the-keys-to-your-kingdom-are-hanging-on-t
- https://github.com/sipeed/NanoKVM/blob/main/CHANGELOG.md#231-2025-12-26
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/
- https://www.cve.org/CVERecord?id=CVE-2026-32296
FAQ
What is CVE-2026-32296?
CVE-2026-32296 is a vulnerability with a CVSS score of 8.2 (HIGH). Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network...
How severe is CVE-2026-32296?
CVE-2026-32296 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32296?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.