Enet Smart Home

4 CVEs product

Monthly

CVE-2026-26369 CRITICAL POC Act Now

eNet SMART HOME server has a privilege escalation vulnerability enabling low-privileged users to gain admin access to the home automation system.

Privilege Escalation Enet Smart Home
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-26368 HIGH POC This Week

eNet Smart Home server versions 2.2.1 and 2.3.1 suffer from missing authorization checks in the resetUserPassword JSON-RPC method, allowing any authenticated low-privileged user to reset passwords for administrative accounts without proper verification. Public exploit code exists for this vulnerability, enabling attackers to achieve immediate privilege escalation and gain full administrative control over the smart home system. No patch is currently available, leaving deployed instances vulnerable to account takeover attacks.

Privilege Escalation Enet Smart Home
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-26367 HIGH POC This Week

eNet Smart Home server versions 2.2.1 and 2.3.1 allow authenticated users to delete arbitrary user accounts through an authorization bypass in the deleteUserAccount JSON-RPC method. Any low-privileged user can submit a crafted request to remove other accounts without elevated permissions, and public exploit code exists for this vulnerability. The impact includes unauthorized account deletion and potential denial of service, with no patch currently available.

Authentication Bypass Enet Smart Home
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-26366 CRITICAL POC Act Now

eNet SMART HOME server ships with default credentials (user:user, admin:admin) (CVSS 9.8) enabling immediate administrative access to the smart home system.

Information Disclosure Enet Smart Home
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-26369
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

eNet SMART HOME server has a privilege escalation vulnerability enabling low-privileged users to gain admin access to the home automation system.

Privilege Escalation Enet Smart Home
NVD
CVE-2026-26368
EPSS 0% CVSS 8.8
HIGH POC This Week

eNet Smart Home server versions 2.2.1 and 2.3.1 suffer from missing authorization checks in the resetUserPassword JSON-RPC method, allowing any authenticated low-privileged user to reset passwords for administrative accounts without proper verification. Public exploit code exists for this vulnerability, enabling attackers to achieve immediate privilege escalation and gain full administrative control over the smart home system. No patch is currently available, leaving deployed instances vulnerable to account takeover attacks.

Privilege Escalation Enet Smart Home
NVD
CVE-2026-26367
EPSS 0% CVSS 8.1
HIGH POC This Week

eNet Smart Home server versions 2.2.1 and 2.3.1 allow authenticated users to delete arbitrary user accounts through an authorization bypass in the deleteUserAccount JSON-RPC method. Any low-privileged user can submit a crafted request to remove other accounts without elevated permissions, and public exploit code exists for this vulnerability. The impact includes unauthorized account deletion and potential denial of service, with no patch currently available.

Authentication Bypass Enet Smart Home
NVD
CVE-2026-26366
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

eNet SMART HOME server ships with default credentials (user:user, admin:admin) (CVSS 9.8) enabling immediate administrative access to the smart home system.

Information Disclosure Enet Smart Home
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy