February report from researcher found Chinese KVM had undocumented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]
Low-cost remote management device shipped with an active audio recording pipeline.
Edit 12/8/2025 5:25 pm PT: Adjusted article to reflect that the report was published in February.
In February, a Slovenian security researcher published an analysis of Sipeed’s NanoKVM that raised far-reaching concerns about the €30-€60 ($35-70) remote management device. Alarmingly, the researcher’s teardown showed the device shipped with a catalogue of security failures and an undocumented microphone that could be activated over SSH. After reporting the issues, many of those problems have been addressed over the intervening months.
The compact RISC-V board, which arrived on the market last year as a budget alternative to PiKVM, offers HDMI capture, USB HID emulation, remote power control, and browser-based access to a connected PC. It is beginning to show up in IT environments precisely because it requires no software on the target machine and can operate from BIOS to OS install.
The researcher says the device’s software stack exposes weak points from the moment it boots. Early units arrived with a pre-set password and open SSH access, a problem the researcher reported to Sipeed and which the company later corrected. The web interface still lacks basic protections, including CSRF defence and any mechanism to invalidate active sessions.
More troubling, the encryption key used to protect login passwords in the browser is hardcoded and identical across all devices. According to the researcher, this had to be explained to the developers “multiple times” before they acknowledged the issue.
The NanoKVM’s network behavior raised further questions, as it routed DNS queries through Chinese servers by default and made routine connections to Sipeed infrastructure to fetch updates and a closed-source binary component. The key verifying that component was stored in plain text on the device, and there was no integrity check for downloaded firmware.
The underlying Linux build was also a heavily pared-down image without common management tools, yet it included tcpdump and aircrack, utilities normally associated with packet inspection and wireless testing rather than production hardware intended to sit on privileged networks.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
All this, paired with the discovery of a tiny surface-mount microphone, should make any user suspicious of the device’s true intentions. The researcher said the microphone is not documented in product materials, yet the operating system includes ALSA tools such as amixer and arecord that can activate it immediately. With default SSH credentials still present on many deployed units, the researcher demonstrated that audio could be recorded and exfiltrated with minimal effort, and streaming that audio in real time would require only modest additional scripting.
Thankfully, because NanoKVM is nominally open source, community members have begun porting alternative Linux distributions, first on Debian and later Ubuntu. Reflashing requires opening the case and writing a new image to the internal microSD card, but early builds already support Sipeed’s modified KVM code. Physically removing the microphone is possible, though the component’s size and placement make it a fiddly job without magnification. Sipeed has since addressed many of the security concerns around the device. However, the general consensus is that users should flash these devices to custom Linux distributions to mitigate potential issues, and many reviewers currently recommend Sipeed products for use in homelab environments.
Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Luke James is a freelance writer and journalist. Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory.
-
SonoraTechnical Of course they did...Reply
Crickets in here without any direct link to the Article Comment Section.... but I guess that's the idea... -
ezst036 I stay away from Chinese tech at all costs for this very reason. You just never know, and the Chinese government is not content enough with spying on its own citizens. It needs to spy on everyone else too.Reply -
bit_user From the story, what I see is a device that's ripe for exploitation, but doesn't obviously have backdoors planted for such a purpose. It looks much more like amateur hour than a serious attempt to backdoor IT infrastructure.Reply
As for the microphone, that has some totally non-nefarious applications, in a KVM. For instance, being able to remotely switch it on to listen for beeps or other unusual noises. In fact, you could even use an anomaly detection model that learns what the environment is supposed to sound like and raises an alarm when it hears anything different.
I'm not trying to excuse the device's flaws, but I do think the story is being over-hyped. -
bit_user Reply
This really doesn't seem like a planted back door by anyone competent (and you best believe the Chinese government has some competent cybersecurity folks). The reason being that, when you backdoor stuff, you want to try and hide it so that:ezst036 said:I stay away from Chinese tech at all costs for this very reason. You just never know, and the Chinese government is not content enough with spying on its own citizens. It needs to spy on everyone else too.
It's not discovered and disabled or mitigated by potential victims.
It's not used by your enemies or criminals to attack your own infrastructure.
So, I'd ask that people use some common sense, when viewing stories of this kind. I'm not saying there are no back doors, but the ones we should worry about are like that attempted xz exploit that nearly succeeded. In fact, we should worry how many similar exploits like that might've gone in that haven't been discovered! -
Insidei SpecsReply
Audio interface: Audio Output: Onboard PA amplifier, can directly connect speakers under 1W
Audio Input: Onboard analog silicon microphone, capable of direct sound reception
Lol -
SirStephenH That's not going to be a high quality mic and it looks pretty well buried inside, surrounded by multiple circuit boards and a plastic case. I'd be interested to know what, if anything, it could hear and at what distance.Reply
I wouldn't be surprised to find out that it's just an off-the-shelf part that comes that way. It's still concerning, but not as concerning as all of the security holes. -
Ronnyx25 This is nothing. Look into Maxio or Maxiotek SSD controllers.Reply
It was a Taiwanese SSD controller company born out of Jmicron.
Now suddenly without any Notice its fully Chinese. No more Taiwanese location. But all in China. While everyone believes it's still the same Trusted Taiwan company. Well think again..
Millions of Computers have these SSD Controllers. While the firmware can send all your secrets to China. -
Walter_Ego this is basically like if the researcher bought a pikvm and published an analysis saying "omg pikvm has hidden bluetooth functionality" or something else because he didn't realise that a pikvm is just a raspberry pi with a hdmi -> csi adaptor and some software.Reply
in this case, the nanokvm is just a licheerv nano with a hdmi -> csi adaptor and some software. the licheerv nano is just a little sbc that happens to have a microphone on board, which is mentioned in the specs.
the link to the analysis is old btw, it's from feb. if the nanokvm wiki content history is accurate, the researcher should have been able to find this information back in 2024.