CVE-2026-32297

Angeet · ES3 KVM

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries, leading to potential system takeover.

Executive summary

The Angeet ES3 KVM is vulnerable to a critical remote, unauthenticated arbitrary file write vulnerability that could allow an attacker to gain full control over the device.

Vulnerability

This vulnerability allows a remote, unauthenticated attacker to write arbitrary files to the Angeet ES3 KVM system. By exploiting an insecure file upload or writing function, an attacker can overwrite critical system binaries or configuration files, effectively bypassing all authentication mechanisms.

Business impact

The impact of this vulnerability is severe, as it allows for a complete compromise of the KVM (Keyboard, Video, Mouse) switch. An attacker could gain persistent access to the device, intercept sensitive console data, or move laterally into the connected server infrastructure, causing massive data breaches and operational downtime.

Remediation

Immediate Action: Immediately update the Angeet ES3 KVM firmware to the latest version. If a patch is unavailable, disconnect the device from the network or place it behind a restrictive firewall.

Proactive Monitoring: Monitor network traffic for unauthorized file transfer protocols targeting the KVM device and review system integrity for modified binaries.

Compensating Controls: Disable any unnecessary remote management features and ensure the device is only accessible through a dedicated, isolated management network or a secure VPN.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability is of the highest priority due to its unauthenticated remote nature and the potential for full system compromise. Administrators must apply the primary firmware update immediately or isolate the device from the network to prevent catastrophic exploitation.