Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27754: CWE-328 Use of Weak Hash in Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) SODOLA SL902-SWTGW124AS

0
Medium
VulnerabilityCVE-2026-27754cvecve-2026-27754cwe-328
Published: Fri Feb 27 2026 (02/27/2026, 18:09:33 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product: SODOLA SL902-SWTGW124AS

Description

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:21:58 UTC

Technical Analysis

CVE-2026-27754 identifies a cryptographic weakness in the SODOLA SL902-SWTGW124AS device firmware, specifically the use of the MD5 hash function for generating session cookies. MD5 is widely recognized as broken due to its susceptibility to collision attacks, where two different inputs produce the same hash output. This vulnerability arises because the device relies on MD5 to create session tokens that authenticate users' sessions. An attacker can exploit the predictability of these tokens combined with MD5's collision properties to forge valid session cookies without needing credentials or user interaction. This allows unauthorized access to the device's management interface or services, potentially leading to device control or data compromise. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting network attack vector, no required privileges or user interaction, and low impact on confidentiality and integrity but no impact on availability. No patches are currently linked, and no active exploits are reported, indicating the vulnerability is newly disclosed. The affected product is a network gateway device produced by Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks), commonly used in certain enterprise or industrial environments. The weakness stems from legacy cryptographic choices and insufficient session token randomness, which modern security standards advise against. Remediation involves replacing MD5 with a secure hash function such as SHA-256 or better, improving session token entropy, and issuing firmware updates to all affected devices.

Potential Impact

The primary impact of this vulnerability is unauthorized access to the affected device due to session cookie forgery. Attackers can bypass authentication mechanisms, potentially gaining administrative control or access to sensitive device functions. This compromises confidentiality and integrity of device management sessions, enabling further attacks such as network reconnaissance, configuration changes, or pivoting within the network. While availability is not directly impacted, unauthorized control could lead to denial-of-service or disruption if attackers manipulate device settings. Organizations relying on these devices for network gateway or security functions face increased risk of compromise, data leakage, and lateral movement by attackers. The lack of required privileges or user interaction makes exploitation easier, increasing the threat surface. The absence of known exploits suggests limited current impact but also highlights the need for proactive mitigation before attackers develop weaponized exploits. Overall, the vulnerability poses a moderate risk to organizations using the affected devices, especially in critical infrastructure or sensitive environments.

Mitigation Recommendations

1. Immediate mitigation involves isolating affected devices from untrusted networks to reduce exposure. 2. Monitor network traffic for anomalous session cookie usage or unauthorized access attempts. 3. Contact the vendor for firmware updates that replace MD5 with a secure hash function and improve session token generation; prioritize applying these updates once available. 4. If firmware updates are unavailable, consider deploying compensating controls such as network segmentation, strict access control lists, and VPNs to restrict management interface access. 5. Implement multi-factor authentication (MFA) on device management interfaces if supported, to add an additional layer of security beyond session tokens. 6. Regularly audit device logs for suspicious activity indicative of session forgery attempts. 7. Educate network administrators about the risks of weak cryptographic functions and encourage migration to devices with modern security standards. 8. Develop incident response plans that include this vulnerability scenario to quickly contain potential breaches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1e1c432ffcdb8a2634773

Added to database: 2/27/2026, 6:26:12 PM

Last enriched: 3/6/2026, 9:21:58 PM

Last updated: 4/14/2026, 4:25:53 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses