CVE-2026-27755 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 2, 2026
SODOLA SL902-SWTGW124AS - Authentication Bypass
Overview
SODOLA SL902-SWTGW124AS firmware <= 200.1.20 contains a broken authentication caused by weak MD5-based session identifier generation, letting attackers with valid credentials bypass authentication and gain unauthorized access.
Severity & Score
Impact
Attackers can bypass authentication and gain unauthorized access to the device.
Mitigation
Update to the latest firmware version beyond 200.1.20.
References
Social Media Activity(2 posts)
šØ CRITICAL: CVE-2026-27755 in SODOLA SL902-SWTGW124AS (ā¤200.1.20) lets attackers forge MD5-based session IDs, bypassing auth remotely. No patch yet ā segment, restrict, monitor! https://radar.offseq.com/threat/cve-2026-27755-cwe-330-use-of-insufficiently-rando-27c7bdab #OffSeq #CVE202627755 #IoTSecurity #Infosec
View original postš“ CVE-2026-27755 - Critical (9.8) SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability that allows attackers to forge authenticated sessions by computing predictable MD5-based cookies. Attackers who know or guess val... š https://www.thehackerwire.com/vulnerability/CVE-2026-27755/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-27755
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 10.7%
- Social Posts
- 2
CWE
- CWE-330
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H