CVE-2026-27755: SODOLA SL902
CVE-2026-27755
Attackers bypass authentication on SODOLA SL902-SWTGW124AS (firmware ≤200.1.20) via weak MD5 session cookies-granting full admin access. Upgrade to post-200.1.20 immediately.
Patch now - CVE-2026-27755 is a critical authentication bypass in SODOLA SL902-SWTGW124AS firmware 200.1.20 and earlier that grants attackers unauthenticated full admin control by forging session cookies. Upgrade to a firmware version newer than 200.1.20 to block this exploit.
Overview
A critical security vulnerability has been identified in certain SODOLA network gateway devices. The flaw is in how the device creates session cookies-the digital “keys” that prove a user is logged in. Due to a weak and predictable method of generation, an attacker can forge these keys without needing to go through the normal login process.
Vulnerability Details
The affected SODOLA SL902-SWTGW124AS devices, running firmware version 200.1.20 and earlier, use the outdated MD5 hashing algorithm to create session identifiers. These identifiers are based on user credentials. Because the process is mathematically predictable and MD5 is considered cryptographically broken, an attacker who knows or can guess a valid username and password can calculate the correct session cookie offline. This allows them to craft a request that tricks the device into believing they are an authenticated, legitimate user.
Impact
The impact of this vulnerability is severe. A successful exploit grants an attacker full administrative access to the gateway device without ever logging in. Once inside, they can:
- Intercept, monitor, or modify network traffic.
- Change device configurations to disrupt operations.
- Use the device as a foothold to launch further attacks on the internal network.
- Potentially render the device inoperable.
Given that these devices often sit at the edge of a network, this level of unauthorized access represents a significant compromise of network integrity and security.
Remediation and Mitigation
Immediate action is required to protect affected systems.
Primary Remediation:
- Upgrade Firmware: Contact SODOLA support to obtain and install a firmware version newer than 200.1.20 that addresses this vulnerability. This is the only complete solution.
Immediate Mitigations (If Patching is Delayed):
- Isolate Devices: Restrict network access to the management interface of the affected gateway. Ensure it is not accessible from the public internet.
- Strengthen Credentials: Immediately change all associated passwords to long, complex, and unique passphrases. This makes credential guessing, which is a prerequisite for this attack, significantly more difficult.
- Monitor Logs: Closely review device authentication and access logs for any suspicious activity, such as logins from unexpected IP addresses.
All organizations using the SODOLA SL902-SWTGW124AS should check their firmware version and apply the update as soon as it is available from the vendor.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attacke...
FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's `TokenAuth` middleware uses a predictable authentication token computed as `MD5...
A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload...
WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation vulnerability that allows attackers to create administrator accounts by submitting crafted requests to the AJAX handler....