| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-26369 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Escalation via setUserGroup | JUNG | eNet SMART HOME server | Critical | 9.8 | 2026-02-15 15:29:56 | Deep Dive |
| CVE-2026-26368 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeover via resetUserPassword | JUNG | eNet SMART HOME server | High | 8.8 | 2026-02-15 15:29:55 | Deep Dive |
| CVE-2026-26367 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User Deletion via deleteUserAccount | JUNG | eNet SMART HOME server | High | 8.1 | 2026-02-15 15:29:55 | Deep Dive |
| CVE-2026-26366 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials | JUNG | eNet SMART HOME server | Critical | 9.8 | 2026-02-15 15:29:54 | Deep Dive |
| CVE-2019-25325 | Thrive Smart Home 1.1 - 'Smart Home' Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | Thrive | Smart Home | High | 8.2 | 2026-02-12 22:48:37 | Deep Dive |
| CVE-2021-47710 | COMMAX Smart Home Ruvie CCTV Bridge DVR Service RTSP Credentials Disclosure | COMMAX Co., Ltd. | Smart Home Ruvie CCTV Bridge DVR Service | - | - | 2025-12-09 20:40:08 | Deep Dive |
| CVE-2021-47709 | COMMAX Smart Home Ruvie CCTV Bridge DVR Service Config Write / DoS | COMMAX Co., Ltd. | Smart Home Ruvie CCTV Bridge DVR Service | - | - | 2025-12-09 20:39:52 | Deep Dive |
| CVE-2021-47708 | COMMAX Smart Home IoT Control System SQL Injection Authentication Bypass | COMMAX Co., Ltd. | Smart Home IoT Control System | - | - | 2025-12-09 20:39:33 | Deep Dive |
| CVE-2024-8070 | Schneider Electric EVlink Home Smart和Schneider Charge 安全漏洞 | Schneider Electric | EVlink Home Smart | High | 8.5 | 2024-10-13 19:50:34 | Deep Dive |
| CVE-2024-5313 | Schneider Electric EVlink Home Smart 安全漏洞 | Schneider Electric | EVlink Home Smart | Medium | 6.5 | 2024-06-12 12:14:59 | Deep Dive |
| CVE-2023-6998 | Lockscreen bypass in eWeLink App | CoolKit Technology | eWeLink - Smart Home | High | 7.7 | 2023-12-30 18:32:07 | Deep Dive |
| CVE-2020-6781 | Improper Certificate Validation in Bosch Smart Home System App for iOS | Bosch | Smart Home | Medium | 6.8 | 2020-09-16 18:10:44 | Deep Dive |
| CVE-2019-11896 | Incorrect pviilege assignment in the 3rd party pairing mechanism of the Bosch Smart Home Controller (SHC) | Bosch | Smart Home Controller | 高危 | - | 2019-05-29 20:11:01 | Deep Dive |
| CVE-2019-11895 | Improper access control in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) | Bosch | Smart Home Controller | 中危 | - | 2019-05-29 20:07:39 | Deep Dive |
| CVE-2019-11894 | Improper access control in the backup mechanism of the Bosch Smart Home Controller (SHC) | Bosch | Smart Home Controller | 中危 | - | 2019-05-29 20:03:48 | Deep Dive |
| CVE-2019-11893 | Incorrect privilege assignment in the app permission update API of the Bosch Smart Home Controller (SHC) | Bosch | Smart Home Controller | 高危 | - | 2019-05-29 19:58:04 | Deep Dive |
| CVE-2019-11892 | Improper access control in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) | Bosch | Smart Home Controller | 高危 | - | 2019-05-29 19:55:13 | Deep Dive |
| CVE-2019-11891 | Incorrect privilege assignment in the app pairing mechanism of the Bosch Smart Home Controller (SHC) | Bosch | Smart Home Controller | 高危 | - | 2019-05-29 19:40:01 | Deep Dive |
| CVE-2018-15125 | Zipato Zipabox 安全漏洞 | Kaspersky Lab | Zipato Zipabox Smart Home Controller | 高危 | - | 2018-08-13 21:00:00 | Deep Dive |
| CVE-2018-15124 | Zipato Zipabox 安全漏洞 | Kaspersky Lab | Zipato Zipabox Smart Home Controller | 超危 | - | 2018-08-13 21:00:00 | Deep Dive |