CVE-2026-27754

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*

History

03 Mar 2026, 19:09

Type Values Removed Values Added
First Time Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware
CPE cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
References () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - Product
References () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-md5-session-token-generation - () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-md5-session-token-generation - Third Party Advisory

27 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 19:16

Updated : 2026-03-03 19:09


NVD link : CVE-2026-27754

Mitre link : CVE-2026-27754

CVE.ORG link : CVE-2026-27754


JSON object : View

Products Affected

sodola-network

  • sl902-swtgw124as_firmware
  • sl902-swtgw124as
CWE
CWE-328

Use of Weak Hash