CVE-2026-26369

Critical
|9.3
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows a low-privileged user to trick the system into giving them administrative access, letting them change device settings and control the entire smart home system. To exploit this, the attacker just needs to send a specially crafted request to the server, without needing any special permissions.

Technical Description

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$8,000($5K-$15K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 15, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago