Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 28 Feb 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung-group
Jung-group enet Smart Home |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:jung-group:enet_smart_home:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:jung-group:enet_smart_home:2.3.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jung-group
Jung-group enet Smart Home |
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 17 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jung
Jung enet Smart Home Server |
|
| Vendors & Products |
Jung
Jung enet Smart Home Server |
Sun, 15 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions. | |
| Title | JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Escalation via setUserGroup | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-17T16:50:04.129Z
Reserved: 2026-02-15T15:02:46.359Z
Link: CVE-2026-26369
Updated: 2026-02-17T15:18:58.741Z
Status : Analyzed
Published: 2026-02-15T16:15:54.407
Modified: 2026-02-28T01:34:28.150
Link: CVE-2026-26369
No data.
OpenCVE Enrichment
Updated: 2026-04-18T12:15:15Z