Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a cross-site request forgery vulnerability in its management interface that allows attackers to induce authenticated users into submitting forged requests. Attackers can craft malicious requests that execute unauthorized configuration or administrative actions with the victim's privileges when the authenticated user visits a malicious webpage.
Published: 2026-02-27
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration changes via CSRF
Action: Immediate patch
AI Analysis

Impact

A cross‑site request forgery flaw exists in the management interface of the SODOLA SL902‑SWTGW124AS switch firmware until version 200.1.20. The vulnerability allows an attacker to trick an authenticated user into submitting web requests that perform configuration or administrative actions. The impact is that any action the authenticated user can perform may be carried out by the attacker, potentially compromising network control and policy settings.

Affected Systems

The affected device is the SODOLA SL902‑SWTGW124AS switch from Shenzhen Hongyavision Technology. Firmware versions up to and including 200.1.20 are vulnerable. No other vendors or product lines are listed as impacted.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to lure a legitimate, authenticated user to a malicious web page to trigger the forged request. The exploit requires the victim to be logged into the switch’s web interface and to have sufficient privileges to invoke the targeted configuration functions. No additional prerequisites such as local access are necessary.

Generated by OpenCVE AI on April 17, 2026 at 13:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install firmware version 200.1.21 or later from the vendor to address the CSRF flaw.
  • Restrict access to the switch’s web management interface by configuring firewall rules or network segmentation so that only trusted IP addresses or internal networks can reach it.
  • Enforce strict user‑account controls by disabling or limiting administrative accounts, requiring strong passwords, and, if supported, enabling multi‑factor authentication.

Generated by OpenCVE AI on April 17, 2026 at 13:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware
CPEs cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware

Mon, 02 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware
CPEs cpe:2.3:o:sodolanetworks:sodola_sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as
Vendors & Products Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
Description SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a cross-site request forgery vulnerability in its management interface that allows attackers to induce authenticated users into submitting forged requests. Attackers can craft malicious requests that execute unauthorized configuration or administrative actions with the victim's privileges when the authenticated user visits a malicious webpage.
Title SODOLA SL902-SWTGW124AS <= 200.1.20 Missing CSRF Protections
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Shenzhen Hongyavision Technology Co Sodola Sl902-swtgw124as
Sodola-network Sl902-swtgw124as Sl902-swtgw124as Firmware
Sodolanetworks Sodola Sl902-swtgw124as Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T17:30:07.748Z

Reserved: 2026-02-23T21:38:48.842Z

Link: CVE-2026-27758

cve-icon Vulnrichment

Updated: 2026-02-27T18:56:32.519Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T19:16:10.183

Modified: 2026-03-03T19:08:51.550

Link: CVE-2026-27758

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:00:15Z

Weaknesses