SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
04 Mar 2026, 02:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sodola-network
Sodola-network sl902-swtgw124as Sodola-network sl902-swtgw124as Firmware |
|
| CPE | cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:* cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:* |
|
| References | () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - Product | |
| References | () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-use-of-default-credentials - Third Party Advisory |
27 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 18:16
Updated : 2026-03-04 02:08
NVD link : CVE-2026-27751
Mitre link : CVE-2026-27751
CVE.ORG link : CVE-2026-27751
JSON object : View
Products Affected
sodola-network
- sl902-swtgw124as_firmware
- sl902-swtgw124as
CWE
CWE-1392
Use of Default Credentials
