Jung-group

Enet Smart Home

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 15.02.2026 15:29:56
  • Zuletzt bearbeitet 28.02.2026 01:34:28

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management ...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 15.02.2026 15:29:55
  • Zuletzt bearbeitet 28.02.2026 01:33:46

eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetUserPassword JSON-RPC method that allows any authenticated low-privileged user (UG_USER) to reset the password of arbitrary accounts, including those in...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 15.02.2026 15:29:54
  • Zuletzt bearbeitet 02.03.2026 15:16:35

eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the deleteUserAccount JSON-RPC method that permits any authenticated low-privileged user (UG_USER) to delete arbitrary user accounts, except for the built-in adm...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 15.02.2026 15:29:53
  • Zuletzt bearbeitet 26.02.2026 22:44:42

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default cred...