Impact
Firmware versions of the SODOLA SL902‑SWTGW124AS switch up to 200.1.20 embed hardcoded default administrative credentials that are never required to be changed. This design flaw, classified as CWE‑1392, permits an attacker who can reach the web‑based management interface to authenticate as a privileged administrator without possessing the correct password. The resulting full administrative control enables the attacker to reconfigure or disable the device, alter network traffic handling, and gain persistence within the network.
Affected Systems
The vulnerability affects switches manufactured by Shenzhen Hongyavision Technology Co., Ltd., under the product line SODOLA SL902‑SWTGW124AS. All firmware releases numbered 200.1.20 or earlier are vulnerable; newer releases with patched authentication are not. Users running devices with these firmware versions are at risk until the firmware is upgraded or the default credentials are changed.
Risk and Exploitability
The flaw carries a high CVSS score of 9.3, but its EPSS score is below 1 %, indicating a low yet non‑zero probability of exploitation at present. The vulnerability is remotely exploitable: an attacker only needs network connectivity to the switch’s management port. The attack requires no special privileges or further access. Although it is not listed in CISA’s KEV catalog, the combination of high severity and wide deployment means that administrators should prioritize remediation.
OpenCVE Enrichment