CVE-2026-26366

CRITICAL
2026-02-15 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Feb 26, 2026 - 22:44 vuln.today
Public exploit code
CVE Published
Feb 15, 2026 - 16:15 nvd
CRITICAL 9.8

Description

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

Analysis

eNet SMART HOME server ships with default credentials (user:user, admin:admin) (CVSS 9.8) enabling immediate administrative access to the smart home system.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and inventory all eNet SMART HOME servers (versions 2.2.1 and 2.3.1) in your environment; immediately isolate affected systems from production networks or restrict network access to trusted administrative sources only. Within 7 days: Change all default credentials (user:user, admin:admin) to strong, unique passwords; implement network access controls limiting connections to authorized personnel only; enable logging and monitoring for authentication attempts. …

Sign in for detailed remediation steps.

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: +20

Share

CVE-2026-26366 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy