Vulnerability Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnerability that allows remote attackers to perform unlimited login attempts against the management interface. Attackers can conduct online password guessing attacks without account lockout or rate limiting restrictions to gain unauthorized access to the device management interface.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sodola-Network | Sl902-Swtgw124As Firmware | <= 200.1.20 |
| Sodola-Network | Sl902-Swtgw124As | - |
Related Weaknesses (CWE)
References
- https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switProduct
- https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-improper-login-rateThird Party Advisory
FAQ
What is CVE-2026-27753?
CVE-2026-27753 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnerability that allows remote attackers to perform unlimited login attempts against the management interf...
How severe is CVE-2026-27753?
CVE-2026-27753 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27753?
Check the references section above for vendor advisories and patch information. Affected products include: Sodola-Network Sl902-Swtgw124As Firmware, Sodola-Network Sl902-Swtgw124As.