MEDIUM · 6.5

CVE-2026-27754

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictab...

Vulnerability Description

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
Sodola-NetworkSl902-Swtgw124As Firmware<= 200.1.20
Sodola-NetworkSl902-Swtgw124As-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-27754?

CVE-2026-27754 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictab...

How severe is CVE-2026-27754?

CVE-2026-27754 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2026-27754?

Check the references section above for vendor advisories and patch information. Affected products include: Sodola-Network Sl902-Swtgw124As Firmware, Sodola-Network Sl902-Swtgw124As.