漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeover via resetUserPassword
Vulnerability Description
eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetUserPassword JSON-RPC method that allows any authenticated low-privileged user (UG_USER) to reset the password of arbitrary accounts, including those in the UG_ADMIN and UG_SUPER_ADMIN groups, without supplying the current password or having sufficient privileges. By sending a crafted JSON-RPC request to /jsonrpc/management, an attacker can overwrite existing credentials, resulting in direct account takeover with full administrative access and persistent privilege escalation.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
授权机制缺失
Vulnerability Title
eNet SMART HOME server 安全漏洞
Vulnerability Description
eNet SMART HOME server是德国eNet公司的一个无线智能家居控制台。 eNet SMART HOME server 2.2.1版本和2.3.1版本存在安全漏洞,该漏洞源于resetUserPassword JSON-RPC方法缺少授权,可能导致任意账户密码被重置。
CVSS Information
N/A
Vulnerability Type
N/A