CVE-2026-27754

MEDIUM

SODOLA SL902-SWTGW124AS Firmware <200.1.20 - Auth Bypass

Title source: llm
STIX 2.1

Description

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.

Scores

CVSS v3 6.5
EPSS 0.0002
EPSS Percentile 5.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-328
Status published
Products (1)
sodola-network/sl902-swtgw124as_firmware < 200.1.20
Published Feb 27, 2026
Tracked Since Feb 28, 2026