Vulnerability Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sodola-Network | Sl902-Swtgw124As Firmware | <= 200.1.20 |
| Sodola-Network | Sl902-Swtgw124As | - |
Related Weaknesses (CWE)
References
- https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switProduct
- https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-md5-session-token-gThird Party Advisory
FAQ
What is CVE-2026-27754?
CVE-2026-27754 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictab...
How severe is CVE-2026-27754?
CVE-2026-27754 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27754?
Check the references section above for vendor advisories and patch information. Affected products include: Sodola-Network Sl902-Swtgw124As Firmware, Sodola-Network Sl902-Swtgw124As.