CVE-2026-27752

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*

History

03 Mar 2026, 19:09

Type Values Removed Values Added
References () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - Product
References () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-cleartext-credential-transmission - () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-cleartext-credential-transmission - Third Party Advisory
First Time Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware
CPE cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*

27 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 18:16

Updated : 2026-03-03 19:09


NVD link : CVE-2026-27752

Mitre link : CVE-2026-27752

CVE.ORG link : CVE-2026-27752


JSON object : View

Products Affected

sodola-network

  • sl902-swtgw124as_firmware
  • sl902-swtgw124as
CWE
CWE-319

Cleartext Transmission of Sensitive Information