CVE-2026-26369 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: February 15, 2026
eNet SMART HOME server - Privilege Escalation
Overview
eNet SMART HOME server 2.2.1 and 2.3.1 contain a privilege escalation caused by insufficient authorization checks in the setUserGroup JSON-RPC method, letting low-privileged users elevate their privileges to admin, exploit requires low-privileged user access.
Severity & Score
Impact
Low-privileged users can gain administrative capabilities, allowing full control over device configurations and network settings.
Mitigation
Update to the latest version that fixes the authorization checks.
References
Social Media Activity(1 post)
š“ CVE-2026-26369 - Critical (9.8) eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme... š https://www.thehackerwire.com/vulnerability/CVE-2026-26369/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-26369
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_access_control
- Status
- new
- EPSS
- 4.1%
- Social Posts
- 1
CWE
- CWE-269
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H