eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Metrics
Affected Vendors & Products
References
History
Sun, 15 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions. | |
| Title | JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-15T15:29:53.866Z
Reserved: 2026-02-15T15:02:02.824Z
Link: CVE-2026-26366
No data.
Status : Received
Published: 2026-02-15T16:15:53.870
Modified: 2026-02-15T16:15:53.870
Link: CVE-2026-26366
No data.
OpenCVE Enrichment
No data.