Impact
The firmware of the SODOLA SL902‑SWTGW124AS network switch up to version 200.1.20 contains an authentication vulnerability that allows an authenticated user to change account passwords without first verifying the current password. This weakness enables an attacker who has accessed the web‑based management interface to alter credentials, maintaining long‑term control of the device or denying legitimate users access by changing or deleting their passwords.
Affected Systems
Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) customers using the SODOLA SL902‑SWTGW124AS array switch with firmware versions 200.1.20 or earlier are impacted.
Risk and Exploitability
The problem scores a CVSS score of 7.1 and an EPSS score of less than 1 %, indicating a moderate severity but a low probability of exploitation at the time of analysis. It is not listed in CISA’s KEV catalog. The likely attack path requires an authenticated session to the management interface; the attacker can then change credentials without confirmation, implying that remote authenticated access is sufficient. This risk is mitigated primarily by ensuring the firmware is updated beyond the vulnerable version or by implementing additional controls as outlined below.
OpenCVE Enrichment