CVE-2026-27752: CWE-319 Cleartext Transmission of Sensitive Information in Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) SODOLA SL902-SWTGW124AS
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
AI Analysis
Technical Summary
CVE-2026-27752 is a vulnerability identified in the SODOLA SL902-SWTGW124AS gateway device manufactured by Shenzhen Hongyavision Technology Co., Ltd. The issue arises because firmware versions up to 200.1.20 transmit authentication credentials over unencrypted HTTP connections. This cleartext transmission of sensitive information (classified under CWE-319) allows an attacker positioned on the same network path to intercept these credentials easily. Since the credentials are sent without encryption, they can be captured using common network sniffing tools. Once obtained, the attacker can reuse the credentials to gain unauthorized administrative access to the gateway device, potentially allowing full control over its configuration and operations. The vulnerability does not require prior authentication or user interaction, making it easier to exploit remotely if network access is available. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack requirement (AT:P), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. No patches or firmware updates have been published yet, and there are no known exploits in the wild. This vulnerability poses a significant risk to organizations relying on this gateway for network access or security functions.
Potential Impact
The primary impact of CVE-2026-27752 is the compromise of administrative credentials through network traffic interception, leading to unauthorized administrative access to the SODOLA SL902-SWTGW124AS gateway. This can result in attackers manipulating device configurations, intercepting or redirecting network traffic, disabling security controls, or using the gateway as a foothold for further network intrusion. The confidentiality of credentials is severely impacted, while integrity and availability impacts depend on attacker actions post-compromise. Organizations worldwide using this device in critical network infrastructure or sensitive environments face increased risk of data breaches, network disruption, and lateral movement by attackers. The ease of exploitation without authentication or user interaction amplifies the threat, especially in environments with insufficient network segmentation or monitoring. The lack of available patches increases exposure duration, necessitating immediate compensating controls. The vulnerability could be particularly damaging in sectors such as telecommunications, industrial control systems, and enterprise networks where this gateway is deployed.
Mitigation Recommendations
1. Immediately segment networks to isolate the SODOLA SL902-SWTGW124AS devices from untrusted or public networks to reduce exposure to attackers. 2. Implement network-level encryption such as VPN tunnels or IPsec to protect traffic between users and the gateway until a firmware patch is available. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious traffic patterns or credential interception attempts. 4. Restrict administrative access to the gateway to trusted IP addresses and enforce strong access control policies. 5. Regularly audit network traffic for unencrypted HTTP sessions involving the device and alert on credential transmissions. 6. Engage with the vendor for firmware updates or patches and apply them promptly once released. 7. Consider replacing affected devices with alternatives that enforce encrypted management protocols (e.g., HTTPS, SSH). 8. Educate network administrators about the risks of cleartext credential transmission and encourage use of secure management channels. These steps go beyond generic advice by focusing on network architecture changes and active monitoring to mitigate risk in the absence of immediate patches.
Affected Countries
China, United States, Germany, South Korea, Japan, India, Russia, Brazil, United Kingdom, France
CVE-2026-27752: CWE-319 Cleartext Transmission of Sensitive Information in Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) SODOLA SL902-SWTGW124AS
Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
AI-Powered Analysis
Technical Analysis
CVE-2026-27752 is a vulnerability identified in the SODOLA SL902-SWTGW124AS gateway device manufactured by Shenzhen Hongyavision Technology Co., Ltd. The issue arises because firmware versions up to 200.1.20 transmit authentication credentials over unencrypted HTTP connections. This cleartext transmission of sensitive information (classified under CWE-319) allows an attacker positioned on the same network path to intercept these credentials easily. Since the credentials are sent without encryption, they can be captured using common network sniffing tools. Once obtained, the attacker can reuse the credentials to gain unauthorized administrative access to the gateway device, potentially allowing full control over its configuration and operations. The vulnerability does not require prior authentication or user interaction, making it easier to exploit remotely if network access is available. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack requirement (AT:P), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. No patches or firmware updates have been published yet, and there are no known exploits in the wild. This vulnerability poses a significant risk to organizations relying on this gateway for network access or security functions.
Potential Impact
The primary impact of CVE-2026-27752 is the compromise of administrative credentials through network traffic interception, leading to unauthorized administrative access to the SODOLA SL902-SWTGW124AS gateway. This can result in attackers manipulating device configurations, intercepting or redirecting network traffic, disabling security controls, or using the gateway as a foothold for further network intrusion. The confidentiality of credentials is severely impacted, while integrity and availability impacts depend on attacker actions post-compromise. Organizations worldwide using this device in critical network infrastructure or sensitive environments face increased risk of data breaches, network disruption, and lateral movement by attackers. The ease of exploitation without authentication or user interaction amplifies the threat, especially in environments with insufficient network segmentation or monitoring. The lack of available patches increases exposure duration, necessitating immediate compensating controls. The vulnerability could be particularly damaging in sectors such as telecommunications, industrial control systems, and enterprise networks where this gateway is deployed.
Mitigation Recommendations
1. Immediately segment networks to isolate the SODOLA SL902-SWTGW124AS devices from untrusted or public networks to reduce exposure to attackers. 2. Implement network-level encryption such as VPN tunnels or IPsec to protect traffic between users and the gateway until a firmware patch is available. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious traffic patterns or credential interception attempts. 4. Restrict administrative access to the gateway to trusted IP addresses and enforce strong access control policies. 5. Regularly audit network traffic for unencrypted HTTP sessions involving the device and alert on credential transmissions. 6. Engage with the vendor for firmware updates or patches and apply them promptly once released. 7. Consider replacing affected devices with alternatives that enforce encrypted management protocols (e.g., HTTPS, SSH). 8. Educate network administrators about the risks of cleartext credential transmission and encourage use of secure management channels. These steps go beyond generic advice by focusing on network architecture changes and active monitoring to mitigate risk in the absence of immediate patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-23T21:38:48.842Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1de4132ffcdb8a26144d5
Added to database: 2/27/2026, 6:11:13 PM
Last enriched: 2/27/2026, 6:25:27 PM
Last updated: 2/28/2026, 6:44:56 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-29741: Elevation of privilege in Google Android
HighCVE-2026-28426: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
HighCVE-2025-11252: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Signum Technology Promotion and Training Inc. windesk.fm
CriticalCVE-2026-2647
UnknownCVE-2026-28425: CWE-94: Improper Control of Generation of Code ('Code Injection') in statamic cms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.