Sl902 Swtgw124as Firmware

8 CVEs product

Monthly

CVE-2026-27758 MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by cross-site request forgery (csrf) (CVSS 4.3).

CSRF Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-27757 HIGH This Week

Sl902-Swtgw124As Firmware versions up to 200.1.20 contains a vulnerability that allows attackers to change account passwords without verifying the current password (CVSS 7.1).

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-27756 MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by cross-site scripting (xss) (CVSS 6.1).

XSS Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-27755 CRITICAL Act Now

Weak session identifier generation in SODOLA SL902-SWTGW124AS network switch firmware allows attackers to predict session tokens and hijack administrative sessions.

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-27754 MEDIUM This Month

Session cookie forgery in SODOLA SL902-SWTGW124AS firmware through version 200.1.20 stems from the use of cryptographically broken MD5 hashing for session token generation, allowing unauthenticated remote attackers to forge valid session cookies and gain unauthorized device access. The vulnerability requires no user interaction and affects all default configurations, with no patch currently available. MD5's known collision vulnerabilities combined with predictable token generation significantly lower the computational barrier for successful exploitation.

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27753 MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by improper restriction of excessive authentication attempts (CVSS 6.5).

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27752 MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by cleartext transmission of sensitive information (CVSS 5.9).

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-27751 CRITICAL Act Now

Default credentials in SODOLA SL902-SWTGW124AS network switch firmware allow unauthenticated remote access. Default credentials are publicly known, enabling complete device takeover.

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-27758
EPSS 0% CVSS 4.3
MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by cross-site request forgery (csrf) (CVSS 4.3).

CSRF Sl902 Swtgw124as Firmware
NVD
CVE-2026-27757
EPSS 0% CVSS 7.1
HIGH This Week

Sl902-Swtgw124As Firmware versions up to 200.1.20 contains a vulnerability that allows attackers to change account passwords without verifying the current password (CVSS 7.1).

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVE-2026-27756
EPSS 0% CVSS 6.1
MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by cross-site scripting (xss) (CVSS 6.1).

XSS Sl902 Swtgw124as Firmware
NVD
CVE-2026-27755
EPSS 0% CVSS 9.8
CRITICAL Act Now

Weak session identifier generation in SODOLA SL902-SWTGW124AS network switch firmware allows attackers to predict session tokens and hijack administrative sessions.

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVE-2026-27754
EPSS 0% CVSS 6.5
MEDIUM This Month

Session cookie forgery in SODOLA SL902-SWTGW124AS firmware through version 200.1.20 stems from the use of cryptographically broken MD5 hashing for session token generation, allowing unauthenticated remote attackers to forge valid session cookies and gain unauthorized device access. The vulnerability requires no user interaction and affects all default configurations, with no patch currently available. MD5's known collision vulnerabilities combined with predictable token generation significantly lower the computational barrier for successful exploitation.

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVE-2026-27753
EPSS 0% CVSS 6.5
MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by improper restriction of excessive authentication attempts (CVSS 6.5).

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVE-2026-27752
EPSS 0% CVSS 5.9
MEDIUM This Month

Sl902-Swtgw124As Firmware versions up to 200.1.20 is affected by cleartext transmission of sensitive information (CVSS 5.9).

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVE-2026-27751
EPSS 0% CVSS 9.8
CRITICAL Act Now

Default credentials in SODOLA SL902-SWTGW124AS network switch firmware allow unauthenticated remote access. Default credentials are publicly known, enabling complete device takeover.

Information Disclosure Sl902 Swtgw124as Firmware
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy