Impact
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP. An attacker who can observe traffic between a user and the device can capture these credentials and then reuse them to gain administrative access to the gateway. The vulnerability is a cleartext transmission of sensitive information (CWE-319).
Affected Systems
The affected vendor is Shenzhen Hongyavision Technology Co., Ltd., trading as Sodola Networks. The specific product is the SODOLA SL902‑SWTGW124AS switch. Firmware versions equal to or earlier than 200.1.20 are impacted. No further sub‑model or firmware distinctions are provided in the advisory.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.2, indicating high severity. The EPSS score is reported as below 1 %, suggesting low real‑world exploitation probability at the present time. The CVE is not listed in the CISA KEV catalog. The most likely attack vector is a network level access that allows sniffing traffic destined for the device, such as a rogue participant on the same LAN or a compromised intermediate device that can capture HTTP traffic. Once credentials are captured, an attacker can log in with administrative privileges, thereby compromising configuration integrity and potentially the entire network segment serviced by the switch.
OpenCVE Enrichment