CVE-2026-26366:
CVE-2026-26366
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Un...
Security Advisory: Critical Default Credential Vulnerability in eNet SMART HOME Server
Overview
A critical security vulnerability exists in the eNet SMART HOME server software, versions 2.2.1 and 2.3.1. The software is shipped with active, well-known default usernames and passwords. These credentials are not disabled during the initial setup process, and the system does not force users to change them. This allows anyone with network access to the server to log in with full administrative privileges.
Vulnerability Details (CVE-2026-26366)
The affected software versions contain two default user accounts:
- Username:
userwith password:user - Username:
adminwith password:admin
These accounts are fully functional upon installation and remain active unless manually changed by the administrator. The absence of a mandatory password change during the commissioning process is the core failure, leaving systems in a known, vulnerable state.
Potential Impact
The impact of this vulnerability is severe. An unauthenticated attacker who can reach the eNet SMART HOME server on your network can:
- Gain Full Administrative Control: Log in and manipulate all smart home devices and settings.
- Access Sensitive Data: View configuration details, user information, and device logs.
- Disrupt Home Operations: Remotely lock/unlock doors, control lighting, thermostats, security cameras, and other connected appliances.
- Pivot to Other Systems: Use the compromised server as a foothold to attack other devices on the local network.
This poses significant safety, privacy, and security risks to the home environment and its occupants.
Remediation and Mitigation Steps
Immediate action is required for all administrators running the affected software.
1. Primary Remediation (Mandatory):
- Change All Default Passwords Immediately. Log into the eNet SMART HOME server interface and change the passwords for both the
adminanduseraccounts to strong, unique passwords. This is the most critical step.
2. Network Security Mitigations:
- Restrict Network Access: Ensure the eNet SMART HOME server is not directly exposed to the public internet. It should be placed behind a firewall on a secured internal network segment.
- Implement Network Segmentation: Consider placing IoT and smart home devices on a separate VLAN isolated from primary business or personal computing networks.
3. General Security Hygiene:
- Monitor for Updates: Regularly check with the vendor (eNet) for a patched software version that removes these default credentials or enforces a password change on first use. Apply any official patches promptly.
- Conduct Regular Audits: Periodically review all IoT and network device configurations for default or weak credentials.
Disclaimer: This advisory is based on publicly available information. Organizations should validate this information against their own systems and monitoring.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attacke...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...