CVE-2026-26368

eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetUserPassword JSON-RPC method that allows any authenticated low-privileged user (UG_USER) to reset the password of arbitrary accounts, including those in the UG_ADMIN and UG_SUPER_ADMIN groups, without supplying the current password or having sufficient privileges. By sending a crafted JSON-RPC request to /jsonrpc/management, an attacker can overwrite existing credentials, resulting in direct account takeover with full administrative access and persistent privilege escalation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-15 16:15

Updated : 2026-02-28 01:33


NVD link : CVE-2026-26368

Mitre link : CVE-2026-26368

CVE.ORG link : CVE-2026-26368


JSON object : View

Products Affected

jung-group

  • enet_smart_home
CWE
CWE-862

Missing Authorization