Description

The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes.

INFO

Published Date :

2026-02-16T09:51:11.375Z

Last Modified :

2026-02-17T16:43:29.855Z

Source :

tenable
AFFECTED PRODUCTS

The following products are affected by CVE-2026-2577 vulnerability.

Vendors Products
Hkuds
  • Nanobot
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-2577.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact