CVE-2026-32297
Angeet · ES3 KVM
The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries, leading to potential system takeover.
Executive summary
The Angeet ES3 KVM is vulnerable to a critical remote, unauthenticated arbitrary file write vulnerability that could allow an attacker to gain full control over the device.
Vulnerability
This vulnerability allows a remote, unauthenticated attacker to write arbitrary files to the Angeet ES3 KVM system. By exploiting an insecure file upload or writing function, an attacker can overwrite critical system binaries or configuration files, effectively bypassing all authentication mechanisms.
Business impact
The impact of this vulnerability is severe, as it allows for a complete compromise of the KVM (Keyboard, Video, Mouse) switch. An attacker could gain persistent access to the device, intercept sensitive console data, or move laterally into the connected server infrastructure, causing massive data breaches and operational downtime.
Remediation
Immediate Action: Immediately update the Angeet ES3 KVM firmware to the latest version. If a patch is unavailable, disconnect the device from the network or place it behind a restrictive firewall.
Proactive Monitoring: Monitor network traffic for unauthorized file transfer protocols targeting the KVM device and review system integrity for modified binaries.
Compensating Controls: Disable any unnecessary remote management features and ensure the device is only accessible through a dedicated, isolated management network or a secure VPN.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability is of the highest priority due to its unauthenticated remote nature and the potential for full system compromise. Administrators must apply the primary firmware update immediately or isolate the device from the network to prevent catastrophic exploitation.