Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27751: CWE-1392 Use of Default Credentials in Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) SODOLA SL902-SWTGW124AS

0
Critical
VulnerabilityCVE-2026-27751cvecve-2026-27751cwe-1392
Published: Fri Feb 27 2026 (02/27/2026, 18:07:58 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product: SODOLA SL902-SWTGW124AS

Description

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:33:22 UTC

Technical Analysis

CVE-2026-27751 is a vulnerability identified in the firmware of the SODOLA SL902-SWTGW124AS device, produced by Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks). The issue stems from the presence of hardcoded default credentials that are not enforced to be changed upon deployment or first use. Firmware versions up to 200.1.20 are affected. This allows remote attackers to authenticate to the device's management interface without any prior authentication or user interaction, gaining full administrative privileges. The vulnerability is classified under CWE-1392, indicating the use of default credentials. The CVSS 4.0 base score is 9.3, reflecting a critical severity level due to the vulnerability's network attack vector, low attack complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The lack of password change enforcement exacerbates the risk, making it trivial for attackers to take control of the device remotely. While no public exploits are currently known, the vulnerability presents a significant risk to any organization deploying this hardware, especially in environments where these devices manage critical network functions or sensitive data.

Potential Impact

The vulnerability allows attackers to gain full administrative control over the affected devices remotely without authentication barriers, leading to complete compromise of device functions. This can result in unauthorized access to sensitive network management interfaces, enabling attackers to alter configurations, intercept or redirect network traffic, disrupt network availability, or use the device as a pivot point for further attacks within an organization’s infrastructure. The confidentiality, integrity, and availability of the network and connected systems are at high risk. Organizations relying on these devices for critical infrastructure or sensitive communications may face operational disruptions, data breaches, or persistent unauthorized access. The ease of exploitation and the critical nature of administrative access make this vulnerability a severe threat to global organizations using these devices.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should verify the firmware version of their SODOLA SL902-SWTGW124AS devices and upgrade to a patched version once available from the vendor. 2. Change default credentials: If a patch is not yet available, manually change all default credentials on the device management interface to strong, unique passwords. 3. Network segmentation: Isolate affected devices on separate network segments with strict access controls to limit exposure to untrusted networks. 4. Access control: Restrict management interface access to trusted IP addresses or VPNs only. 5. Monitor logs and network traffic for unusual access patterns or authentication attempts targeting these devices. 6. Vendor engagement: Engage with Shenzhen Hongyavision Technology for official patches and security advisories. 7. Incident response readiness: Prepare to respond to potential compromises by backing up configurations and having recovery procedures in place. 8. Disable remote management if not required to reduce attack surface. These steps go beyond generic advice by focusing on immediate compensating controls and vendor coordination.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1de4132ffcdb8a26144d1

Added to database: 2/27/2026, 6:11:13 PM

Last enriched: 3/6/2026, 9:33:22 PM

Last updated: 4/13/2026, 11:11:52 PM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses