Vulnerability Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sodola-Network | Sl902-Swtgw124As Firmware | <= 200.1.20 |
| Sodola-Network | Sl902-Swtgw124As | - |
Related Weaknesses (CWE)
References
- https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switProduct
- https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-cleartext-credentiaThird Party Advisory
FAQ
What is CVE-2026-27752?
CVE-2026-27752 is a vulnerability with a CVSS score of 5.9 (MEDIUM). SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe netwo...
How severe is CVE-2026-27752?
CVE-2026-27752 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27752?
Check the references section above for vendor advisories and patch information. Affected products include: Sodola-Network Sl902-Swtgw124As Firmware, Sodola-Network Sl902-Swtgw124As.