eNet SMART HOME server 2.3.1 (resetUserPassword) Account Takeover

Title: eNet SMART HOME server 2.3.1 (resetUserPassword) Account Takeover
Advisory ID: ZSL-2026-5974
Type: Local/Remote
Impact: Denial of Service, Privilege Escalation, Security Bypass, System Access, DoS
Risk: (4/5)
Release Date: 14.02.2026
Summary
Two German specialists in building systems technology are jointly bringing a new, wireless-based smart home system to the market. Gira and JUNG are the companies behind the eNet SMART HOME brand with our subsidiary, INSTA, responsible for developing the system. All three of us are old hands when it comes to building automation, and have a history of connecting buildings in an intelligent way that goes back as far as the 80s. Gira, JUNG and INSTA were part of the group of companies that initiated and founded EIBA (now known as KNX). KNX is the first open global standard for home and building automation. Through KNX, we have decisively shaped the development of intelligent building systems technology – and this wealth of experience has now come together in eNet SMART HOME. The eNet server is the heart of every eNet SMART HOME system and offers end customers the basis for an easy-to-use and secure Smart Home and installation engineers easily understandable and professional commissioning of the system.
Description
The eNet Smart Home system contains an authorization flaw in the resetUserPassword functionality that allows any authenticated low-privileged user (UG_USER) to reset the password of arbitrary accounts, including those in the UG_ADMIN and UG_SUPER_ADMIN groups, without supplying the current password or having sufficient privileges. By sending a crafted JSON-RPC request, an attacker can overwrite existing credentials. This is a a direct account takeover via improper authorization, resulting in full administrative access and persistent privilege escalation.
Vendor
Gira Giersiepen GmbH & Co. KG | ALBRECHT JUNG GmbH & Co. KG | Insta GmbH - https://www.enet-smarthome.com
Affected Version
2.3.1 (46841)
2.2.1 (46056)
Tested On
GNU/Linux 4.4.15 (ARMv7 revision 5)
Jetty(9.2.z-SNAPSHOT)
Vendor Status
[07.02.2026] Vulnerability discovered.
[07.02.2026] Vendor contacted.
[13.02.2026] No response from the vendor.
[14.02.2026] Public security advisory released.
PoC
enet_pwdreset.txt
Credits
Vulnerability discovered by Gjoko Krstic - <[email protected]>
References
[1] https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5975.php
Changelog
[14.02.2026] - Initial release
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: [email protected]