Cyber Posture

CVE-2026-26366

CriticalPublic PoC

Published: 15 February 2026

Published
15 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26366 is a critical-severity Use of Default Credentials (CWE-1392) vulnerability in Jung-Group Enet Smart Home. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 21.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and AC-2 (Account Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 directly prohibits the use of default authenticators and requires implementation of initial authenticator change requirements, comprehensively preventing exploitation of unchanged default credentials.

prevent

AC-2 requires management of system accounts including disabling unnecessary or inactive accounts, addressing default accounts that remain active post-installation.

prevent

CM-6 mandates establishment and implementation of secure configuration settings, enabling enforcement of mandatory password changes or disabling of default credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1133 External Remote Services Persistence
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
Why these techniques?

Default credentials on network-accessible admin interface directly enable initial access via valid default accounts (T1078.001) over external remote services (T1133).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart…

more

home configuration and control functions.

Deeper analysisAI

CVE-2026-26366 affects the eNet SMART HOME server in versions 2.2.1 and 2.3.1, which ship with default credentials (user:user and admin:admin) that remain active post-installation and commissioning without requiring a mandatory password change. This vulnerability, classified under CWE-1392 (Use of Default Credentials), enables unauthenticated access to administrative functions for sensitive smart home configuration and control. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and high impact on confidentiality, integrity, and availability.

Unauthenticated attackers with network access to the eNet SMART HOME server can exploit this issue by simply using the default credentials to log in and gain full administrative privileges. Successful exploitation allows control over smart home devices, configuration settings, and potentially connected IoT endpoints, enabling unauthorized surveillance, device manipulation, or disruption of home automation services without requiring privileges, user interaction, or complex preconditions.

Mitigation details are outlined in advisories from VulnCheck (https://www.vulncheck.com/advisories/jung-enet-smart-home-server-use-of-default-credent) and Zero Science (https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5972.php), published around the CVE disclosure on 2026-02-15. Security practitioners should review these for vendor-recommended remediation steps, such as immediate credential changes and configuration hardening.

Details

CWE(s)

Affected Products

jung-group
enet smart home
2.2.1, 2.3.1

CVEs Like This One

CVE-2026-26369Same product: Jung-Group Enet Smart Home
CVE-2026-26367Same product: Jung-Group Enet Smart Home
CVE-2026-26368Same product: Jung-Group Enet Smart Home
CVE-2025-8731Shared CWE-1392
CVE-2026-26341Shared CWE-1392
CVE-2025-1160Shared CWE-1392
CVE-2025-2398Shared CWE-1392
CVE-2025-54756Shared CWE-1392
CVE-2026-26235Same vendor: Jung-Group
CVE-2025-10542Shared CWE-1392

References