CVE-2026-26366

CRITICAL

eNet SMART HOME 2.2.1/2.3.1 - Auth Bypass

Title source: llm
STIX 2.1

Description

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

Scores

CVSS v3 9.8
EPSS 0.0007
EPSS Percentile 21.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-1392
Status published
Products (2)
jung-group/enet_smart_home 2.2.1
jung-group/enet_smart_home 2.3.1
Published Feb 15, 2026
Tracked Since Feb 18, 2026