Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung-group
Jung-group enet Smart Home |
|
| CPEs | cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jung-group
Jung-group enet Smart Home |
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 17 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung
Jung enet Smart Home Server |
|
| Vendors & Products |
Jung
Jung enet Smart Home Server |
Sun, 15 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions. | |
| Title | JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-17T16:51:25.025Z
Reserved: 2026-02-15T15:02:02.824Z
Link: CVE-2026-26366
Updated: 2026-02-17T15:19:00.223Z
Status : Analyzed
Published: 2026-02-15T16:15:53.870
Modified: 2026-02-26T22:44:42.813
Link: CVE-2026-26366
No data.
OpenCVE Enrichment
Updated: 2026-04-17T19:30:15Z