CVE-2026-32296
Published: 17 March 2026
Description
Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the…
more
system memory and terminate the KVM process.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses and minimizes permitted actions without identification or authentication, preventing exposure of the Wi-Fi configuration endpoint to unauthenticated attackers.
Enforces approved authorizations to block unauthorized access and modifications to the Wi-Fi configuration endpoint.
Protects against denial-of-service effects like memory exhaustion and KVM process termination from crafted requests to the endpoint.
Security SummaryAI
CVE-2026-32296 is a vulnerability in Sipeed NanoKVM versions prior to 2.3.1, where a Wi-Fi configuration endpoint is exposed without proper security checks. This issue, tied to CWE-306 (Missing Authentication for Critical Function), allows unauthorized modifications or disruptions. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) and was published on 2026-03-17.
An unauthenticated attacker with network access to the device can exploit the endpoint by crafting requests to alter the saved Wi-Fi network configuration to one of their choosing, potentially redirecting the device's connectivity. Alternatively, they can send requests designed to exhaust system memory, resulting in termination of the KVM process and denial of service.
The Sipeed NanoKVM CHANGELOG documents the fix in version 2.3.1, released on 2025-12-26. Additional guidance appears in advisories from Eclypsium and CISA, with full details available via the referenced sources.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated network access to exposed Wi-Fi config endpoint enables exploitation of public-facing application (T1190) for unauthorized config modification and memory exhaustion DoS via crafted requests (T1499.004).