CVE-2026-26366
CRITICALeNet SMART HOME 2.2.1/2.3.1 - Auth Bypass
Title source: llmDescription
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Scores
CVSS v3
9.8
EPSS
0.0005
EPSS Percentile
13.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-1392
Status
published
Affected Products (2)
jung-group/enet_smart_home
jung-group/enet_smart_home
Timeline
Published
Feb 15, 2026
Tracked Since
Feb 18, 2026