Impact
Firmware versions up to 200.1.20 embed an improperly encoded user input field in the management interface. The flaw allows malicious JavaScript to be reflected back into the browser when an authenticated user visits a crafted URL. The primary consequence is client‑side script execution; the vendor’s description does not specify further impact, but such scripts can potentially steal session cookies or perform actions on behalf of the authenticated user. Based on the description, it is inferred that the attacker could use the compromised session to gain additional access to the network device, although this is not explicitly stated in the advisory.
Affected Systems
The vulnerability targets the SODOLA SL902‑SWTGW124AS managed switch from Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks). All firmware releases through 200.1.20 are affected; newer firmware should mitigate the issue.
Risk and Exploitability
The CVSS score of 5.1 reflects moderate severity, while the EPSS probability of less than 1% indicates low likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. Exploitation requires the attacker to convince an authenticated user to click a malicious link, so the risk is bounded to management‑interface users. No elevated privileges or remote code execution are possible; the threat is restricted to session compromise within a user’s browser.
OpenCVE Enrichment