Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32298: Angeet ES3 KVM OS Command Injection via cfg.lua Script
CVE-2026-32298: Angeet ES3 KVM OS Command Injection via cfg.lua Script
SECURITYHIGHCVE-2026-32298

CVE-2026-32298: Angeet ES3 KVM OS Command Injection via cfg.lua Script

A high-severity OS command injection vulnerability (CVSS 9.1) in the Angeet ES3 KVM switch allows authenticated attackers to execute arbitrary OS-level...

Dylan H.

Security Team

March 18, 2026
5 min read

Affected Products

  • Angeet ES3 KVM Switch (all firmware versions)

Executive Summary

A high-severity OS command injection vulnerability (CVE-2026-32298, CVSS 9.1) has been disclosed in the Angeet ES3 KVM switch. The flaw exists in the device's cfg.lua web configuration script, which fails to properly sanitize user-supplied input before passing it to OS-level command execution routines. An authenticated attacker with access to the device's management interface can exploit this vulnerability to execute arbitrary commands on the underlying operating system.

CVSS Score: 9.1 (High)

Published to the NVD on March 17, 2026, this vulnerability (CWE-78 — Improper Neutralization of Special Elements used in an OS Command) affects KVM switch infrastructure commonly deployed in data centres, server rooms, and managed service provider environments.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-32298
CVSS Score9.1 (High)
CWECWE-78: OS Command Injection
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow (authenticated)
User InteractionNone
Vulnerable Componentcfg.lua web configuration script
Root CauseUnsanitized user input passed to OS command execution

Affected Products

VendorProductAffected VersionsFixed Version
AngeetES3 KVM SwitchAll firmware versionsNone available

Vulnerability Details

OS Command Injection in cfg.lua

The Angeet ES3 KVM switch exposes a web-based management interface that includes a configuration script (cfg.lua) responsible for processing user-supplied parameters and applying device settings. The script fails to sanitize one or more input variables before incorporating them into shell command strings that are executed by the underlying operating system.

An authenticated attacker can craft malicious input containing shell metacharacters (such as ;, |, `, $(), or &&) to break out of the intended command context and inject arbitrary OS-level commands.

Attack flow:

1. Attacker authenticates to the KVM management web interface
2. Attacker identifies parameters accepted by cfg.lua
3. Attacker injects shell metacharacters and malicious commands into
   a vulnerable parameter (e.g., ?param=value;id)
4. The cfg.lua script passes unsanitized input to the OS command handler
5. Injected command executes with the privileges of the web server process
6. Attacker achieves OS-level command execution on the KVM device

Impact of Successful Exploitation

A successful exploit gives the attacker command execution on the KVM device's underlying OS. Depending on the process privilege level, an attacker could:

  • Exfiltrate device configuration and credentials — including credentials stored for connected systems
  • Pivot to connected servers — KVM switches have direct console access to attached servers
  • Modify device firmware or configuration — persistent backdoors, port forwarding, or credential capture
  • Disrupt operations — disconnect or interfere with console access to managed servers
  • Lateral movement — use captured credentials to access other infrastructure

The elevated CVSS score of 9.1 reflects the low attack complexity, network accessibility, and significant impact on confidentiality, integrity, and availability.


Deployment Context and Risk

KVM switches are frequently deployed in high-trust network segments with privileged access to multiple servers. The ES3 model is marketed for small-to-medium data centre environments where a single device may provide console access to tens of servers.

Deployment ContextRisk LevelNotes
Internet-exposed management interfaceCriticalDirect exploitation from the internet with valid credentials
Internal network (data centre segment)HighAny attacker with internal access and valid credentials
Managed service provider environmentsHighOne KVM may provide access to multiple client environments
Out-of-band management networksHighOften less monitored; exploitation may go undetected

Recommended Mitigations

No vendor patch is currently available. Apply the following compensating controls immediately.

1. Restrict Management Interface Access

# Limit access to the KVM management interface to a dedicated management VLAN
# Block all inbound access from untrusted network segments
# Example (adjust port and interface as appropriate):
iptables -I INPUT -p tcp --dport 443 -s <MGMT_VLAN_CIDR> -j ACCEPT
iptables -I INPUT -p tcp --dport 443 -j DROP

2. Enforce Strong Authentication

  • Change all default credentials immediately
  • Use unique, strong passwords for the KVM management account
  • Where supported, restrict management access to specific IP addresses

3. Place Behind a Jump Host or Privileged Access Workstation

Move all KVM management access behind a dedicated privileged access workstation (PAW) or jump server. No direct access to KVM management interfaces from end-user workstations.

4. Network Segmentation

Ensure the KVM management interface is on an isolated management VLAN that is not reachable from general corporate networks or the internet.

5. Monitor for Exploitation Indicators

IndicatorDescription
Unexpected processes spawned by web serverPost-exploitation command execution
Unusual network connections from the KVM deviceData exfiltration or C2 communication
Configuration changes not initiated by administratorsBackdoor installation or tampering
Authentication events from unexpected source IPsCredential compromise and attacker access

Post-Remediation Checklist

  1. Verify management interface is isolated — confirm the device is not reachable from untrusted networks
  2. Rotate all credentials — change KVM management passwords and any credentials stored on or accessible via the device
  3. Review access logs — check for any unexpected authentication or configuration change events
  4. Audit connected server credentials — if the device was compromised, credentials of connected servers may be exposed
  5. Contact vendor — request patch availability and apply when released
  6. Consider replacement — if no patch timeline is provided, evaluate replacing the device with one from a vendor with an active security response programme

References

  • CVE-2026-32298 — NVD
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command — MITRE

Related Reading

  • CVE-2026-3630: Delta CommGR2 Stack Buffer Overflow
  • CVE-2026-28775: IDC SFX Satellite Receiver SNMP RCE
#CVE#OS Command Injection#KVM#Hardware#CWE-78#NVD

Related Articles

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read

CVE-2026-30303 — Axon Code OS Command Injection via Whitelist Bypass

The command auto-approval module in Axon Code contains an OS Command Injection vulnerability. An incompatible Unix-based shell-quote parser is used on Windows, rendering the security whitelist mechanism completely ineffective.

5 min read

CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)

A critical vulnerability in Gematik Authenticator prior to version 4.16.0 allows attackers to hijack authentication sessions via malicious deep links, potentially authenticating as victim users without their credentials.

5 min read
Back to all Security Alerts