CVE-2026-26366
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Analysis
eNet SMART HOME server ships with default credentials (user:user, admin:admin) (CVSS 9.8) enabling immediate administrative access to the smart home system.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify and inventory all eNet SMART HOME servers (versions 2.2.1 and 2.3.1) in your environment; immediately isolate affected systems from production networks or restrict network access to trusted administrative sources only. Within 7 days: Change all default credentials (user:user, admin:admin) to strong, unique passwords; implement network access controls limiting connections to authorized personnel only; enable logging and monitoring for authentication attempts. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today