Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 26 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung-group
Jung-group enet Smart Home |
|
| CPEs | cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jung-group
Jung-group enet Smart Home |
Tue, 17 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 17 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung
Jung enet Smart Home Server |
|
| Vendors & Products |
Jung
Jung enet Smart Home Server |
Sun, 15 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the deleteUserAccount JSON-RPC method that permits any authenticated low-privileged user (UG_USER) to delete arbitrary user accounts, except for the built-in admin account. The application does not enforce role-based access control on this function, allowing a standard user to submit a crafted POST request to /jsonrpc/management specifying another username to have that account removed without elevated permissions or additional confirmation. | |
| Title | JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User Deletion via deleteUserAccount | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-02T14:49:41.144Z
Reserved: 2026-02-15T15:02:17.449Z
Link: CVE-2026-26367
Updated: 2026-02-17T14:42:14.046Z
Status : Modified
Published: 2026-02-15T16:15:54.060
Modified: 2026-03-02T15:16:35.977
Link: CVE-2026-26367
No data.
OpenCVE Enrichment
Updated: 2026-04-16T17:15:17Z