Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.
Published: 2026-02-27
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Administrative Control via Default Credentials
Action: Immediate Patch
AI Analysis

Impact

Firmware versions of the SODOLA SL902‑SWTGW124AS switch up to 200.1.20 embed hardcoded default administrative credentials that are never required to be changed. This design flaw, classified as CWE‑1392, permits an attacker who can reach the web‑based management interface to authenticate as a privileged administrator without possessing the correct password. The resulting full administrative control enables the attacker to reconfigure or disable the device, alter network traffic handling, and gain persistence within the network.

Affected Systems

The vulnerability affects switches manufactured by Shenzhen Hongyavision Technology Co., Ltd., under the product line SODOLA SL902‑SWTGW124AS. All firmware releases numbered 200.1.20 or earlier are vulnerable; newer releases with patched authentication are not. Users running devices with these firmware versions are at risk until the firmware is upgraded or the default credentials are changed.

Risk and Exploitability

The flaw carries a high CVSS score of 9.3, but its EPSS score is below 1 %, indicating a low yet non‑zero probability of exploitation at present. The vulnerability is remotely exploitable: an attacker only needs network connectivity to the switch’s management port. The attack requires no special privileges or further access. Although it is not listed in CISA’s KEV catalog, the combination of high severity and wide deployment means that administrators should prioritize remediation.

Generated by OpenCVE AI on April 16, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest firmware version released by Sodola Networks that removes the hardcoded credentials, such as firmware 200.1.21 or newer.
  • Immediately change any remaining default administrative usernames and passwords to unique, strong credentials.
  • If an immediate firmware upgrade is impractical, restrict access to the management interface to trusted internal networks and enforce strong password policies on the device.

Generated by OpenCVE AI on April 16, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware
CPEs cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware

Mon, 02 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware
CPEs cpe:2.3:o:sodolanetworks:sodola_sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as
Vendors & Products Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as

Fri, 27 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.
Title SODOLA SL902-SWTGW124AS <= 200.1.20 Use of Default Credentials
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Shenzhen Hongyavision Technology Co Sodola Sl902-swtgw124as
Sodola-network Sl902-swtgw124as Sl902-swtgw124as Firmware
Sodolanetworks Sodola Sl902-swtgw124as Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T17:29:56.732Z

Reserved: 2026-02-23T21:38:48.842Z

Link: CVE-2026-27751

cve-icon Vulnrichment

Updated: 2026-02-27T19:33:14.691Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T18:16:12.897

Modified: 2026-03-04T02:08:00.523

Link: CVE-2026-27751

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:30:06Z

Weaknesses