Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
Published: 2026-02-27
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Cleartext credential transmission leading to potential remote administrative access.
Action: Immediate Patch
AI Analysis

Impact

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP. An attacker who can observe traffic between a user and the device can capture these credentials and then reuse them to gain administrative access to the gateway. The vulnerability is a cleartext transmission of sensitive information (CWE-319).

Affected Systems

The affected vendor is Shenzhen Hongyavision Technology Co., Ltd., trading as Sodola Networks. The specific product is the SODOLA SL902‑SWTGW124AS switch. Firmware versions equal to or earlier than 200.1.20 are impacted. No further sub‑model or firmware distinctions are provided in the advisory.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.2, indicating high severity. The EPSS score is reported as below 1 %, suggesting low real‑world exploitation probability at the present time. The CVE is not listed in the CISA KEV catalog. The most likely attack vector is a network level access that allows sniffing traffic destined for the device, such as a rogue participant on the same LAN or a compromised intermediate device that can capture HTTP traffic. Once credentials are captured, an attacker can log in with administrative privileges, thereby compromising configuration integrity and potentially the entire network segment serviced by the switch.

Generated by OpenCVE AI on April 16, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all SODOLA SL902‑SWTGW124AS switches to firmware newer than 200.1.20.
  • Reconfigure management access to use HTTPS or SSH instead of HTTP for all interfaces that expose authentication credentials.
  • If an upgrade is not feasible, disable the HTTP management interface or isolate the device on a network segment that blocks HTTP traffic from external sources.

Generated by OpenCVE AI on April 16, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware
CPEs cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware

Mon, 02 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware
CPEs cpe:2.3:o:sodolanetworks:sodola_sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as
Vendors & Products Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as

Fri, 27 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
Title SODOLA SL902-SWTGW124AS <= 200.1.20 Cleartext Credential Transmission
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Shenzhen Hongyavision Technology Co Sodola Sl902-swtgw124as
Sodola-network Sl902-swtgw124as Sl902-swtgw124as Firmware
Sodolanetworks Sodola Sl902-swtgw124as Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T17:29:57.533Z

Reserved: 2026-02-23T21:38:48.842Z

Link: CVE-2026-27752

cve-icon Vulnrichment

Updated: 2026-02-27T19:28:30.620Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T18:16:13.083

Modified: 2026-03-03T19:09:44.853

Link: CVE-2026-27752

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:30:06Z

Weaknesses