CVE-2026-27751

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*

History

04 Mar 2026, 02:08

Type Values Removed Values Added
First Time Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware
CPE cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
References () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - Product
References () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-use-of-default-credentials - () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-use-of-default-credentials - Third Party Advisory

27 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 18:16

Updated : 2026-03-04 02:08


NVD link : CVE-2026-27751

Mitre link : CVE-2026-27751

CVE.ORG link : CVE-2026-27751


JSON object : View

Products Affected

sodola-network

  • sl902-swtgw124as_firmware
  • sl902-swtgw124as
CWE
CWE-1392

Use of Default Credentials