CVE-2026-26368
Authorization Bypass in eNet SMART HOME Allows Admin Account Takeover
Publication date: 2026-02-15
Last updated on: 2026-02-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jung-group | enet_smart_home | 2.2.1 |
| jung-group | enet_smart_home | 2.3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The eNet SMART HOME server versions 2.2.1 and 2.3.1 have a critical missing authorization vulnerability in the resetUserPassword JSON-RPC method.
This flaw allows any authenticated user with low privileges (UG_USER) to reset the passwords of arbitrary accounts, including those with UG_ADMIN and UG_SUPER_ADMIN privileges, without needing to provide the current password or having the necessary authorization.
An attacker can exploit this by sending a specially crafted JSON-RPC request to the /jsonrpc/management endpoint, which overwrites existing user credentials.
This results in direct account takeover, granting full administrative access and persistent privilege escalation within the system.
How can this vulnerability impact me? :
Exploiting this vulnerability can lead to unauthorized system access by allowing attackers to take over any user account, including those with administrative and super-administrative privileges.
This results in full administrative control over the affected system, enabling persistent privilege escalation.
The impacts include potential denial of service, security bypass, and unauthorized access to sensitive system functions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unusual or unauthorized JSON-RPC requests sent to the /jsonrpc/management endpoint, especially those attempting to invoke the resetUserPassword method.'}, {'type': 'paragraph', 'content': 'Specifically, detection involves looking for crafted JSON-RPC requests from authenticated low-privileged users (UG_USER) that attempt to reset passwords of other accounts, including those with administrative privileges.'}, {'type': 'paragraph', 'content': 'Network or system administrators can use network traffic inspection tools or web server logs to identify such suspicious requests.'}, {'type': 'list_item', 'content': 'Use tools like tcpdump or Wireshark to capture HTTP POST requests to /jsonrpc/management.'}, {'type': 'list_item', 'content': 'Search web server logs for POST requests containing the JSON-RPC method "resetUserPassword".'}, {'type': 'list_item', 'content': "Example command to search logs: grep 'resetUserPassword' /var/log/httpd/access_log"}, {'type': 'list_item', 'content': 'Use curl or similar tools to test if the endpoint accepts unauthorized password reset requests (in a controlled environment).'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the /jsonrpc/management endpoint to trusted users only and monitoring for suspicious activity.
Since the vulnerability allows any authenticated low-privileged user to reset passwords without authorization, it is critical to limit authentication to trusted users and consider disabling or restricting the resetUserPassword method if possible.
Applying vendor patches or updates once available is essential to fully remediate the issue.
- Restrict network access to the eNet SMART HOME server management interface.
- Implement strict authentication and authorization controls.
- Monitor logs for exploitation attempts and unauthorized password resets.
- Contact the vendor for patches or updates addressing this vulnerability.