CVE-2026-26367

High
|7.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows any low-privileged user of the eNet SMART HOME server to delete other user accounts, except for the admin account, simply by sending a specially crafted request. The attacker just needs to be logged in as a regular user, and there are no additional permissions or confirmations required to carry out this action.

Technical Description

eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the deleteUserAccount JSON-RPC method that permits any authenticated low-privileged user (UG_USER) to delete arbitrary user accounts, except for the built-in admin account. The application does not enforce role-based access control on this function, allowing a standard user to submit a crafted POST request to /jsonrpc/management specifying another username to have that account removed without elevated permissions or additional confirmation.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,211($1K-$5K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 15, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago