CVE-2026-27751: SODOLA SL902
CVE-2026-27751
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attacke...
Overview
A critical security vulnerability has been identified in certain SODOLA industrial networking gateways. The vulnerability stems from the device firmware containing unchangeable, factory-set default administrator credentials. This allows any remote attacker who can reach the device’s management interface to log in with full administrative privileges, completely bypassing normal authentication.
Vulnerability Details
The affected product is the SODOLA SL902-SWTGW124AS industrial gateway. All firmware versions up to and including 200.1.20 are vulnerable. The device’s software contains hardcoded default username and password combinations that cannot be changed by the user. Furthermore, the system does not force or prompt the administrator to set a new, strong password upon first use. An attacker can easily discover or guess these common defaults to gain access.
Potential Impact
The impact of this vulnerability is severe. With administrative access, an attacker can:
- Completely compromise the device: Modify network settings, intercept or block data traffic, and disable security functions.
- Use the device as an entry point: Move laterally from the gateway into the broader industrial control or corporate network it connects to.
- Disrupt operations: Alter configurations to cause network outages or operational downtime in critical industrial environments.
- Deploy malware: Install persistent malicious software on the gateway itself.
Given the CVSS score of 9.8 (Critical), this flaw is considered highly exploitable with minimal complexity and can lead to a full compromise of confidentiality, integrity, and system availability.
Remediation and Mitigation
Immediate action is required for all users of the SODOLA SL902-SWTGW124AS gateway.
Primary Remediation:
- Contact the Vendor: Immediately reach out to SODOLA support to inquire about a firmware update that addresses CVE-2026-27751. Apply any patched firmware (version newer than 200.1.20) as soon as it is available and tested in your environment.
Immediate Mitigations (If a Patch is Not Yet Available):
- Isolate the Device: Restrict network access to the gateway’s management interface. Use firewall rules to ensure it is not accessible from the public internet or untrusted network segments. Only allow connections from specific, necessary administrative workstations.
- Monitor Access Logs: Closely review the device’s authentication and access logs for any suspicious login attempts, especially from unexpected IP addresses.
- Network Segmentation: Ensure the gateway and the industrial devices behind it are placed in a dedicated, isolated network zone with strict traffic controls to limit the potential for lateral movement if a breach occurs.
Important Note: Simply trying to change the admin password in the web interface is not a solution, as the hardcoded credentials will still function. You must rely on network-level controls until a firmware patch is applied.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Un...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...