CVE-2026-27751
SODOLA · SL902-SWTGW124AS Firmware
SODOLA SL902-SWTGW124AS firmware contains hardcoded default credentials, allowing remote attackers to gain full administrative control over the device management interface.
Executive summary
The use of hardcoded default credentials in SODOLA firmware allows unauthenticated remote attackers to seize total administrative control of affected network switches.
Vulnerability
This is a default credentials vulnerability where the management interface is accessible using factory-set logins. An unauthenticated remote attacker can bypass security controls because the system does not enforce a password change upon initial setup.
Business impact
An attacker gaining administrative access to a network switch can intercept traffic, redirect data, or disable network segments entirely. With a CVSS score of 9.8, this vulnerability represents a critical risk to network infrastructure security and data privacy, potentially leading to a complete breach of the internal network.
Remediation
Immediate Action: Update the firmware to the latest version and immediately change all default administrative passwords to unique, complex strings.
Proactive Monitoring: Audit management logs for successful logins from unexpected IP addresses and monitor for unauthorized configuration changes.
Compensating Controls: Disable the web management interface on public-facing ports and restrict management access to a dedicated, isolated Management VLAN.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The presence of default credentials on network infrastructure is a critical security failure. Administrators must update the firmware and rotate all passwords immediately to prevent unauthorized remote management of the hardware.