Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sodola-network
Sodola-network sl902-swtgw124as Sodola-network sl902-swtgw124as Firmware |
|
| CPEs | cpe:2.3:h:sodola-network:sl902-swtgw124as:-:*:*:*:*:*:*:* cpe:2.3:o:sodola-network:sl902-swtgw124as_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sodola-network
Sodola-network sl902-swtgw124as Sodola-network sl902-swtgw124as Firmware |
Mon, 02 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware |
|
| CPEs | cpe:2.3:o:sodolanetworks:sodola_sl902-swtgw124as_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sodolanetworks
Sodolanetworks sodola Sl902-swtgw124as Firmware |
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as |
|
| Vendors & Products |
Shenzhen Hongyavision Technology Co
Shenzhen Hongyavision Technology Co sodola Sl902-swtgw124as |
Fri, 27 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device. | |
| Title | SODOLA SL902-SWTGW124AS <= 200.1.20 MD5 Session Token Generation | |
| Weaknesses | CWE-328 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-03T18:09:56.948Z
Reserved: 2026-02-23T21:38:48.842Z
Link: CVE-2026-27754
Updated: 2026-02-27T19:20:47.566Z
Status : Analyzed
Published: 2026-02-27T19:16:09.320
Modified: 2026-03-03T19:09:23.627
Link: CVE-2026-27754
No data.
OpenCVE Enrichment
Updated: 2026-03-02T12:06:53Z