Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.3
eNet SMART HOME server 2.2.1 and 2.3.1: Unauthorized User Access
CVE-2026-26369
Summary
A user with limited access can gain extra powers on the eNet SMART HOME server by sending a special request. This allows them to control settings and devices that they shouldn't be able to access. Update the server to a fixed version to prevent this.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| jung-group | enet_smart_home | 2.2.1 | – |
| jung-group | enet_smart_home | 2.3.1 | – |
Original title
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) ca...
Original description
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions.
nvd CVSS3.1
9.8
nvd CVSS4.0
9.3
Vulnerability type
CWE-269
Improper Privilege Management
- https://www.vulncheck.com/advisories/jung-enet-smart-home-server-privilege-escal... Broken Link
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5975.php Third Party Advisory Exploit
Published: 15 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026