Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sipeed
Sipeed nanokvm |
|
| Vendors & Products |
Sipeed
Sipeed nanokvm |
Tue, 17 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process. | |
| Title | Sipeed NanoKVM unauthenticated Wi-Fi configuration endpoint | |
| Weaknesses | CWE-306 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-03-17T18:10:26.448Z
Reserved: 2026-03-11T18:26:54.750Z
Link: CVE-2026-32296
Updated: 2026-03-17T18:10:23.448Z
Status : Awaiting Analysis
Published: 2026-03-17T18:16:16.960
Modified: 2026-03-18T14:52:44.227
Link: CVE-2026-32296
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:49:02Z