2026-02-15 15:29CVE-2026-26366VulnCheck
PUBLISHED5.2CWE-1392

JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

Problem type

Affected products

JUNG

eNet SMART HOME server

2.3.1 (46841) - AFFECTED

2.2.1 (46056) - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-26366
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-26366",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-02-15T15:29:53.866Z",
    "dateReserved": "2026-02-15T15:02:02.824Z",
    "datePublished": "2026-02-15T15:29:53.866Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-02-15T15:29:53.866Z"
      },
      "datePublic": "2026-02-14T00:00:00.000Z",
      "title": "JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials",
      "descriptions": [
        {
          "lang": "en",
          "value": "eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions."
        }
      ],
      "affected": [
        {
          "vendor": "JUNG",
          "product": "eNet SMART HOME server",
          "versions": [
            {
              "version": "2.3.1 (46841)",
              "status": "affected"
            },
            {
              "version": "2.2.1 (46056)",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Use of Default Credentials",
              "cweId": "CWE-1392",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5972.php",
          "name": "Zero Science Lab Vulnerability Advisory ZSL-2026-5972",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/jung-enet-smart-home-server-use-of-default-credent",
          "name": "VulnCheck Advisory: JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS"
        },
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "LiquidWorm as Gjoko Krstic of Zero Science Lab",
          "type": "finder"
        }
      ]
    }
  }
}