CVE-2026-26366

CRITICAL

eNet SMART HOME 2.2.1/2.3.1 - Auth Bypass

Title source: llm

Description

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

Scores

CVSS v3 9.8
EPSS 0.0005
EPSS Percentile 13.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-1392
Status published

Affected Products (2)

jung-group/enet_smart_home
jung-group/enet_smart_home

Timeline

Published Feb 15, 2026
Tracked Since Feb 18, 2026