eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung
Jung enet Smart Home Server |
|
| Vendors & Products |
Jung
Jung enet Smart Home Server |
Sun, 15 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions. | |
| Title | JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-15T15:29:53.866Z
Reserved: 2026-02-15T15:02:02.824Z
Link: CVE-2026-26366
No data.
Status : Received
Published: 2026-02-15T16:15:53.870
Modified: 2026-02-15T16:15:53.870
Link: CVE-2026-26366
No data.
OpenCVE Enrichment
Updated: 2026-02-16T09:42:49Z
Weaknesses