CVE-2026-27757
Published: 27 February 2026
Summary
CVE-2026-27757 is a high-severity Unverified Password Change (CWE-620) vulnerability in Sodola-Network Sl902-Swtgw124As Firmware. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Account Manipulation (T1098); ranked at the 18.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability directly enables unauthorized password changes on existing accounts without current-password verification (CWE-620), mapping to account manipulation for persistence and credential control on the network device.
NVD Description
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication vulnerability that allows authenticated users to change account passwords without verifying the current password. Attackers who gain access to an authenticated session can modify credentials to maintain persistent access to the…
more
management interface.
Deeper analysisAI
CVE-2026-27757, published on 2026-02-27, is an authentication vulnerability (CWE-620) in the SODOLA SL902-SWTGW124AS firmware versions through 200.1.20. The flaw allows authenticated users to change account passwords without verifying the current password, enabling unauthorized credential modifications. It has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N), indicating high integrity impact potential over the network.
Attackers require low privileges (PR:L) to exploit this vulnerability, gaining initial access to an authenticated session on the management interface. Once authenticated, exploitation is straightforward with low complexity and no user interaction needed. Successful attacks allow the adversary to alter passwords, securing persistent access to the device and potentially enabling further compromise of the network switch.
Advisories and vendor resources provide further details on the issue. Security practitioners should consult the VulnCheck advisory at https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-unverified-password-change and the SODOLA product page at https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch for any patch or mitigation guidance.
Details
- CWE(s)