CVE-2026-26366

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:*

History

26 Feb 2026, 22:44

Type Values Removed Values Added
CPE cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:*
References () https://www.vulncheck.com/advisories/jung-enet-smart-home-server-use-of-default-credent - () https://www.vulncheck.com/advisories/jung-enet-smart-home-server-use-of-default-credent - Broken Link
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5972.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5972.php - Third Party Advisory, Exploit
First Time Jung-group enet Smart Home
Jung-group

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) El servidor eNet SMART HOME 2.2.1 y 2.3.1 se envía con credenciales predeterminadas (usuario:usuario, admin:admin) que permanecen activas después de la instalación y puesta en marcha sin forzar un cambio de contraseña obligatorio. Atacantes no autenticados pueden usar estas credenciales predeterminadas para obtener acceso administrativo a funciones sensibles de configuración y control del hogar inteligente.

15 Feb 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-15 16:15

Updated : 2026-02-26 22:44


NVD link : CVE-2026-26366

Mitre link : CVE-2026-26366

CVE.ORG link : CVE-2026-26366


JSON object : View

Products Affected

jung-group

  • enet_smart_home
CWE
CWE-1392

Use of Default Credentials