Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.3

eNet SMART HOME server has easy-to-guess admin passwords

CVE-2026-26366
Summary

The eNet SMART HOME server comes with default passwords that don't get changed after setup, allowing anyone to access sensitive home settings and controls without permission. This is a serious security risk, especially for homes with sensitive smart devices. To stay safe, update to a newer version that fixes this issue or change the passwords immediately after installation.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
jung-group enet_smart_home 2.2.1
jung-group enet_smart_home 2.3.1
Original title
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change....
Original description
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
nvd CVSS3.1 9.8
nvd CVSS4.0 9.3
Vulnerability type
CWE-1392
Published: 15 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026