Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27752: CWE-319 Cleartext Transmission of Sensitive Information in Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) SODOLA SL902-SWTGW124AS

0
High
VulnerabilityCVE-2026-27752cvecve-2026-27752cwe-319
Published: Fri Feb 27 2026 (02/27/2026, 18:08:32 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product: SODOLA SL902-SWTGW124AS

Description

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.

AI-Powered Analysis

AILast updated: 02/27/2026, 18:25:27 UTC

Technical Analysis

CVE-2026-27752 is a vulnerability identified in the SODOLA SL902-SWTGW124AS gateway device manufactured by Shenzhen Hongyavision Technology Co., Ltd. The issue arises because firmware versions up to 200.1.20 transmit authentication credentials over unencrypted HTTP connections. This cleartext transmission of sensitive information (classified under CWE-319) allows an attacker positioned on the same network path to intercept these credentials easily. Since the credentials are sent without encryption, they can be captured using common network sniffing tools. Once obtained, the attacker can reuse the credentials to gain unauthorized administrative access to the gateway device, potentially allowing full control over its configuration and operations. The vulnerability does not require prior authentication or user interaction, making it easier to exploit remotely if network access is available. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack requirement (AT:P), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. No patches or firmware updates have been published yet, and there are no known exploits in the wild. This vulnerability poses a significant risk to organizations relying on this gateway for network access or security functions.

Potential Impact

The primary impact of CVE-2026-27752 is the compromise of administrative credentials through network traffic interception, leading to unauthorized administrative access to the SODOLA SL902-SWTGW124AS gateway. This can result in attackers manipulating device configurations, intercepting or redirecting network traffic, disabling security controls, or using the gateway as a foothold for further network intrusion. The confidentiality of credentials is severely impacted, while integrity and availability impacts depend on attacker actions post-compromise. Organizations worldwide using this device in critical network infrastructure or sensitive environments face increased risk of data breaches, network disruption, and lateral movement by attackers. The ease of exploitation without authentication or user interaction amplifies the threat, especially in environments with insufficient network segmentation or monitoring. The lack of available patches increases exposure duration, necessitating immediate compensating controls. The vulnerability could be particularly damaging in sectors such as telecommunications, industrial control systems, and enterprise networks where this gateway is deployed.

Mitigation Recommendations

1. Immediately segment networks to isolate the SODOLA SL902-SWTGW124AS devices from untrusted or public networks to reduce exposure to attackers. 2. Implement network-level encryption such as VPN tunnels or IPsec to protect traffic between users and the gateway until a firmware patch is available. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious traffic patterns or credential interception attempts. 4. Restrict administrative access to the gateway to trusted IP addresses and enforce strong access control policies. 5. Regularly audit network traffic for unencrypted HTTP sessions involving the device and alert on credential transmissions. 6. Engage with the vendor for firmware updates or patches and apply them promptly once released. 7. Consider replacing affected devices with alternatives that enforce encrypted management protocols (e.g., HTTPS, SSH). 8. Educate network administrators about the risks of cleartext credential transmission and encourage use of secure management channels. These steps go beyond generic advice by focusing on network architecture changes and active monitoring to mitigate risk in the absence of immediate patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1de4132ffcdb8a26144d5

Added to database: 2/27/2026, 6:11:13 PM

Last enriched: 2/27/2026, 6:25:27 PM

Last updated: 2/28/2026, 6:44:56 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses