Impact
The eNet SMART HOME server releases 2.2.1 and 2.3.1 contain active default user accounts that do not prompt for a password change after installation. Unauthenticated users can log in with the known credentials and gain full administrative control over the device’s configuration and smart home device management functions. This allows an attacker to modify system settings, disconnect or connect smart devices, and potentially intercept or tamper with home network traffic controlled by the server.
Affected Systems
The vulnerability affects Jung Group’s eNet SMART HOME server, specifically versions 2.2.1 and 2.3.1. Only devices running these firmware releases are impacted.
Risk and Exploitability
The CVSS v3 score of 9.3 indicates a high severity flaw; the exploitability is virtually trivial because an attacker only needs to know the default credentials and does not require additional code execution. The EPSS score of less than 1% suggests that, statistically, the probability of exploitation is low at this time, yet the fact that no password change is enforced makes it a high value target for opportunistic attackers. The flaw is not currently catalogued in CISA’s KEV list, but its presence makes it a priority for administrators to remediate.
OpenCVE Enrichment