Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27758: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) SODOLA SL902-SWTGW124AS

0
Medium
VulnerabilityCVE-2026-27758cvecve-2026-27758cwe-352
Published: Fri Feb 27 2026 (02/27/2026, 18:11:35 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product: SODOLA SL902-SWTGW124AS

Description

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a cross-site request forgery vulnerability in its management interface that allows attackers to induce authenticated users into submitting forged requests. Attackers can craft malicious requests that execute unauthorized configuration or administrative actions with the victim's privileges when the authenticated user visits a malicious webpage.

AI-Powered Analysis

AILast updated: 02/27/2026, 18:42:18 UTC

Technical Analysis

CVE-2026-27758 is a cross-site request forgery (CSRF) vulnerability identified in the firmware of the SODOLA SL902-SWTGW124AS device produced by Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks). The vulnerability exists in firmware versions up to 200.1.20 within the device's management interface. CSRF vulnerabilities allow attackers to induce authenticated users to unknowingly submit forged HTTP requests, which the device processes with the user's privileges. In this case, an attacker crafts malicious web content that, when visited by an authenticated administrator or user of the device's management interface, triggers unauthorized configuration or administrative commands. The vulnerability requires no prior authentication or privileges from the attacker and no user interaction beyond visiting a malicious webpage. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on integrity. The vulnerability could allow unauthorized changes to device settings, potentially disrupting network operations or compromising device security. No patches or public exploits are currently known, and the vulnerability was published on February 27, 2026. This issue falls under CWE-352, a common web security weakness related to CSRF. The device is typically deployed in network environments requiring secure management interfaces, making this vulnerability a concern for network administrators and security teams.

Potential Impact

The primary impact of CVE-2026-27758 is the potential for unauthorized administrative or configuration changes to the SODOLA SL902-SWTGW124AS device. Such changes could disrupt network operations, degrade device security, or create persistent backdoors for attackers. Since the vulnerability exploits the trust relationship between the authenticated user and the device, attackers can leverage social engineering or phishing campaigns to induce users to visit malicious sites, triggering the CSRF attack. This could lead to unauthorized modifications such as altering firewall rules, changing routing configurations, or disabling security features. The vulnerability does not directly compromise confidentiality or availability but can indirectly lead to service disruptions or data exposure through misconfiguration. Organizations relying on this device for critical network infrastructure may face operational risks and increased attack surface. The lack of authentication requirements for exploitation and the ease of triggering the vulnerability via web browsers increase the risk profile. However, the need for user interaction (visiting a malicious webpage) somewhat limits the scope of exploitation. No known exploits in the wild reduce immediate risk but do not eliminate it. Overall, the vulnerability poses a medium risk to organizations using affected devices, especially those with exposed management interfaces or users susceptible to phishing.

Mitigation Recommendations

1. Restrict access to the management interface of the SODOLA SL902-SWTGW124AS device by implementing network segmentation and firewall rules to limit access only to trusted administrative hosts. 2. Disable remote management interfaces if not required or restrict them to VPN connections to reduce exposure to external attackers. 3. Educate users and administrators about phishing and social engineering risks to reduce the likelihood of visiting malicious websites that could trigger CSRF attacks. 4. Implement web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block suspicious CSRF attack patterns targeting the device's management interface. 5. Monitor device logs and network traffic for unusual configuration changes or access patterns that may indicate exploitation attempts. 6. Regularly check for firmware updates or patches from Shenzhen Hongyavision Technology Co., Ltd. and apply them promptly once available. 7. Consider deploying multi-factor authentication (MFA) on the management interface if supported, to add an additional layer of protection against unauthorized actions. 8. Employ anti-CSRF tokens or other CSRF protection mechanisms in the management interface if firmware updates or vendor patches become available addressing this vulnerability. 9. Conduct periodic security assessments and penetration tests focusing on network device management interfaces to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1e1c432ffcdb8a2634783

Added to database: 2/27/2026, 6:26:12 PM

Last enriched: 2/27/2026, 6:42:18 PM

Last updated: 2/27/2026, 8:42:30 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses