Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability that allows attackers to forge authenticated sessions by computing predictable MD5-based cookies. Attackers who know or guess valid credentials can calculate the session identifier offline and bypass authentication without completing the login flow, gaining unauthorized access to the device. | |
| Title | SODOLA SL902-SWTGW124AS <= 200.1.20 Predictable Session ID | |
| Weaknesses | CWE-330 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-27T19:01:17.431Z
Reserved: 2026-02-23T21:38:48.842Z
Link: CVE-2026-27755
Updated: 2026-02-27T19:01:12.235Z
Status : Received
Published: 2026-02-27T19:16:09.527
Modified: 2026-02-27T19:16:09.527
Link: CVE-2026-27755
No data.
OpenCVE Enrichment
No data.