Impact
The eNet SMART HOME server 2.2.1 and 2.3.1 allows a low‑privileged user to send a crafted POST request to /jsonrpc/management, specifying their own username. This bypasses authorization checks in the setUserGroup method and escalates the account to UG_ADMIN, giving full administrative rights to modify device configurations, network settings, and other smart‑home functions. The weakness reflects improper authorization (CWE‑269).
Affected Systems
JUNG eNet SMART HOME server versions 2.2.1 and 2.3.1
Risk and Exploitability
The vulnerability has a CVSS score of 9.3, indicating critical severity. EPSS is reported as less than 1%, suggesting low to negligible exploitation probability, and it is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is a crafted POST request to the /jsonrpc/management endpoint, which a legitimate user can send with their own username to elevate privileges. Because the exploit requires only knowledge of the victim’s own username, it can be performed without additional reconnaissance, making this flaw particularly attractive for malicious actors who have already gained authenticated access to the system. Mitigating the risk requires the vendor to issue a patch or otherwise enforce proper authorization checks.
OpenCVE Enrichment