eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the deleteUserAccount JSON-RPC method that permits any authenticated low-privileged user (UG_USER) to delete arbitrary user accounts, except for the built-in admin account. The application does not enforce role-based access control on this function, allowing a standard user to submit a crafted POST request to /jsonrpc/management specifying another username to have that account removed without elevated permissions or additional confirmation.
References
| Link | Resource |
|---|---|
| https://www.vulncheck.com/advisories/jung-enet-smart-home-server-arbitrary-user-deletio | Broken Link |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5973.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-15 16:15
Updated : 2026-03-02 15:16
NVD link : CVE-2026-26367
Mitre link : CVE-2026-26367
CVE.ORG link : CVE-2026-26367
JSON object : View
Products Affected
jung-group
- enet_smart_home
CWE
CWE-862
Missing Authorization
