Description
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
Problem types
Product status
2.2.1 (46056)
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5972.php (Zero Science Lab Vulnerability Advisory ZSL-2026-5972)
www.vulncheck.com/...mart-home-server-use-of-default-credent (VulnCheck Advisory: JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials)