Unrated severityNVD Advisory· Published Feb 15, 2026· Updated Feb 17, 2026
JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Escalation via setUserGroup
CVE-2026-26369
Description
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions.
Affected products
2- Range: 2.2.1 and 2.3.1
- JUNG/eNet SMART HOME serverv5Range: 2.3.1 (46841)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.vulncheck.com/advisories/jung-enet-smart-home-server-privilege-escalation-vmitrethird-party-advisory
- www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5975.phpmitrethird-party-advisory
News mentions
0No linked articles in our index yet.