Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials
Vulnerability Description
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
CWE-1392
Vulnerability Title
eNet SMART HOME server 安全漏洞
Vulnerability Description
eNet SMART HOME server是德国eNet公司的一个无线智能家居控制台。 eNet SMART HOME server 2.2.1版本和2.3.1版本存在安全漏洞,该漏洞源于使用默认凭据,可能导致未经身份验证的攻击者获得管理访问权限。
CVSS Information
N/A
Vulnerability Type
N/A