SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnerability that allows remote attackers to perform unlimited login attempts against the management interface. Attackers can conduct online password guessing attacks without account lockout or rate limiting restrictions to gain unauthorized access to the device management interface.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
03 Mar 2026, 19:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:* cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Sodola-network
Sodola-network sl902-swtgw124as Sodola-network sl902-swtgw124as Firmware |
|
| References | () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - Product | |
| References | () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-improper-login-rate-limiting - Third Party Advisory |
27 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 18:16
Updated : 2026-03-03 19:09
NVD link : CVE-2026-27753
Mitre link : CVE-2026-27753
CVE.ORG link : CVE-2026-27753
JSON object : View
Products Affected
sodola-network
- sl902-swtgw124as_firmware
- sl902-swtgw124as
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
