CVE-2026-26368
Unknown Unknown - Not Provided
Authorization Bypass in eNet SMART HOME Allows Admin Account Takeover

Publication date: 2026-02-15

Last updated on: 2026-02-28

Assigner: VulnCheck

Description
eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetUserPassword JSON-RPC method that allows any authenticated low-privileged user (UG_USER) to reset the password of arbitrary accounts, including those in the UG_ADMIN and UG_SUPER_ADMIN groups, without supplying the current password or having sufficient privileges. By sending a crafted JSON-RPC request to /jsonrpc/management, an attacker can overwrite existing credentials, resulting in direct account takeover with full administrative access and persistent privilege escalation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-15
Last Modified
2026-02-28
Generated
2026-05-07
AI Q&A
2026-02-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
jung-group enet_smart_home 2.2.1
jung-group enet_smart_home 2.3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The eNet SMART HOME server versions 2.2.1 and 2.3.1 have a critical missing authorization vulnerability in the resetUserPassword JSON-RPC method.

This flaw allows any authenticated user with low privileges (UG_USER) to reset the passwords of arbitrary accounts, including those with UG_ADMIN and UG_SUPER_ADMIN privileges, without needing to provide the current password or having the necessary authorization.

An attacker can exploit this by sending a specially crafted JSON-RPC request to the /jsonrpc/management endpoint, which overwrites existing user credentials.

This results in direct account takeover, granting full administrative access and persistent privilege escalation within the system.


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to unauthorized system access by allowing attackers to take over any user account, including those with administrative and super-administrative privileges.

This results in full administrative control over the affected system, enabling persistent privilege escalation.

The impacts include potential denial of service, security bypass, and unauthorized access to sensitive system functions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unusual or unauthorized JSON-RPC requests sent to the /jsonrpc/management endpoint, especially those attempting to invoke the resetUserPassword method.'}, {'type': 'paragraph', 'content': 'Specifically, detection involves looking for crafted JSON-RPC requests from authenticated low-privileged users (UG_USER) that attempt to reset passwords of other accounts, including those with administrative privileges.'}, {'type': 'paragraph', 'content': 'Network or system administrators can use network traffic inspection tools or web server logs to identify such suspicious requests.'}, {'type': 'list_item', 'content': 'Use tools like tcpdump or Wireshark to capture HTTP POST requests to /jsonrpc/management.'}, {'type': 'list_item', 'content': 'Search web server logs for POST requests containing the JSON-RPC method "resetUserPassword".'}, {'type': 'list_item', 'content': "Example command to search logs: grep 'resetUserPassword' /var/log/httpd/access_log"}, {'type': 'list_item', 'content': 'Use curl or similar tools to test if the endpoint accepts unauthorized password reset requests (in a controlled environment).'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the /jsonrpc/management endpoint to trusted users only and monitoring for suspicious activity.

Since the vulnerability allows any authenticated low-privileged user to reset passwords without authorization, it is critical to limit authentication to trusted users and consider disabling or restricting the resetUserPassword method if possible.

Applying vendor patches or updates once available is essential to fully remediate the issue.

  • Restrict network access to the eNet SMART HOME server management interface.
  • Implement strict authentication and authorization controls.
  • Monitor logs for exploitation attempts and unauthorized password resets.
  • Contact the vendor for patches or updates addressing this vulnerability.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart