Description
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions.
Published: 2026-02-15
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The eNet SMART HOME server 2.2.1 and 2.3.1 allows a low‑privileged user to send a crafted POST request to /jsonrpc/management, specifying their own username. This bypasses authorization checks in the setUserGroup method and escalates the account to UG_ADMIN, giving full administrative rights to modify device configurations, network settings, and other smart‑home functions. The weakness reflects improper authorization (CWE‑269).

Affected Systems

JUNG eNet SMART HOME server versions 2.2.1 and 2.3.1

Risk and Exploitability

The vulnerability has a CVSS score of 9.3, indicating critical severity. EPSS is reported as less than 1%, suggesting low to negligible exploitation probability, and it is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is a crafted POST request to the /jsonrpc/management endpoint, which a legitimate user can send with their own username to elevate privileges. Because the exploit requires only knowledge of the victim’s own username, it can be performed without additional reconnaissance, making this flaw particularly attractive for malicious actors who have already gained authenticated access to the system. Mitigating the risk requires the vendor to issue a patch or otherwise enforce proper authorization checks.

Generated by OpenCVE AI on April 18, 2026 at 12:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade to a patched version as soon as it becomes available
  • Restrict network access to the /jsonrpc/management endpoint with firewall rules or subnet segmentation so that only trusted management devices can reach it
  • Enforce least privilege for user accounts by removing unnecessary group assignments and regularly review group membership to detect unauthorized changes

Generated by OpenCVE AI on April 18, 2026 at 12:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Feb 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Jung-group
Jung-group enet Smart Home
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:*
Vendors & Products Jung-group
Jung-group enet Smart Home

Tue, 17 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Jung
Jung enet Smart Home Server
Vendors & Products Jung
Jung enet Smart Home Server

Sun, 15 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions.
Title JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Escalation via setUserGroup
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Jung Enet Smart Home Server
Jung-group Enet Smart Home
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-17T16:50:04.129Z

Reserved: 2026-02-15T15:02:46.359Z

Link: CVE-2026-26369

cve-icon Vulnrichment

Updated: 2026-02-17T15:18:58.741Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-15T16:15:54.407

Modified: 2026-02-28T01:34:28.150

Link: CVE-2026-26369

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses