CVE-2026-27751:
Default credentials vulnerability in SODOLA SL902-SWTGW124AS firmware allows remote attackers to gain administrative access.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.8Critical- Published Date:Feb 27, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.1
- EPSS Percentile:15%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Default credentials vulnerability in SODOLA SL902-SWTGW124AS firmware allows remote attackers to gain administrative access.
Overview
The vulnerability in SODOLA SL902-SWTGW124AS firmware presents a severe security risk. It allows unauthorized remote access to the device's administrative interface using known default credentials. This issue affects all firmware versions up to and including 200.1.20. The vulnerability is particularly dangerous due to its low complexity of exploitation and the high impact on confidentiality, integrity, and availability of the affected systems. With a CVSS v3.1 base score of 9.8 and a CVSS v4.0 base score of 9.3, both rated as CRITICAL, this vulnerability requires immediate attention from network administrators and security professionals managing these devices.
Remediation
- To address this vulnerability, network administrators should take the following steps:
- 1. Immediately change default credentials on all affected SODOLA SL902-SWTGW124AS devices.
- 2. Implement strong, unique passwords for each device.
- 3. Regularly check for and apply firmware updates from SODOLA.
- 4. Limit network access to the management interface, preferably restricting it to trusted internal networks only.
- 5. Implement additional security measures such as multi-factor authentication if available.
- 6. Monitor devices for any signs of unauthorized access or suspicious activities.
- 7. Consider replacing affected devices if SODOLA does not provide a timely security patch.
References
- [1] SODOLA. "SODOLA 6-Port 2.5G Easy Web Managed Switch." SODOLA Network. https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch
- [2] VulnCheck. "SODOLA SL902-SWTGW124AS Use of Default Credentials." VulnCheck Advisories. https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-use-of-default-credentials
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.