eNet SMART HOME server 2.2.1 and 2.3.1 contains a...
Critical severity
Unreviewed
Published
Feb 15, 2026
to the GitHub Advisory Database
•
Updated Feb 15, 2026
Description
Published by the National Vulnerability Database
Feb 15, 2026
Published to the GitHub Advisory Database
Feb 15, 2026
Last updated
Feb 15, 2026
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabilities such as modifying device configurations, network settings, and other smart home system functions.
References