CVE-2026-27755

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability that allows attackers to forge authenticated sessions by computing predictable MD5-based cookies. Attackers who know or guess valid credentials can calculate the session identifier offline and bypass authentication without completing the login flow, gaining unauthorized access to the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*

History

03 Mar 2026, 19:09

Type Values Removed Values Added
CPE cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:*
cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:*
References () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - () https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch - Product
References () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-predictable-session-id - () https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-predictable-session-id - Third Party Advisory
First Time Sodola-network
Sodola-network sl902-swtgw124as
Sodola-network sl902-swtgw124as Firmware

27 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 19:16

Updated : 2026-03-03 19:09


NVD link : CVE-2026-27755

Mitre link : CVE-2026-27755

CVE.ORG link : CVE-2026-27755


JSON object : View

Products Affected

sodola-network

  • sl902-swtgw124as_firmware
  • sl902-swtgw124as
CWE
CWE-330

Use of Insufficiently Random Values