Unrated severityNVD Advisory· Published Feb 15, 2026· Updated Feb 17, 2026
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials
CVE-2026-26366
Description
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Affected products
2- Range: = 2.2.1, 2.3.1
- JUNG/eNet SMART HOME serverv5Range: 2.3.1 (46841)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.vulncheck.com/advisories/jung-enet-smart-home-server-use-of-default-credentmitrethird-party-advisory
- www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5972.phpmitrethird-party-advisory
News mentions
0No linked articles in our index yet.