Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-27751 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Default credentials in SODOLA SL902-SWTGW124AS. <br>πŸ’₯ **Consequences**: Remote attackers gain full admin access. Total compromise of the industrial switch.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-1392 (Use of Hard-coded Credentials). <br>❌ **Flaw**: The device ships with static, unchangeable default passwords that are publicly known.

Q3Who is affected? (Versions/Components)

🏭 **Affected**: SODOLA SL902-SWTGW124AS (Industrial Switch). <br>πŸ“… **Version**: 200.1.20 and earlier. <br>🏒 **Vendor**: Shenzhen Hongyavision Technology Co., Ltd.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: Full Administrative Access. <br>πŸ‘οΈ **Data**: High Confidentiality & Integrity impact. Attackers can read configs, modify network settings, and potentially pivot to other devices.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. <br>🌐 **Auth**: None required (Remote). <br>πŸ”‘ **Config**: No special setup needed. Just login with default creds. CVSS Score: 9.8 (Critical).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“¦ **Public Exp?**: No specific PoC code listed in data. <br>πŸ” **Reality**: Exploitation is trivial. No complex code needed, just credential guessing/login.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for SODOLA SL902-SWTGW124AS devices. <br>πŸ§ͺ **Test**: Attempt login with known default credentials (e.g., admin/admin). <br>πŸ“‘ **Tools**: Use vulnerability scanners targeting default cred databases.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Upgrade firmware to version > 200.1.20. <br>πŸ“₯ **Source**: Check vendor advisories or official support portal for patches.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Change default password immediately! <br>πŸ”’ **Mitigation**: Disable remote management if possible. Isolate device in VLAN. Monitor for unauthorized access.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. <br>⏱️ **Priority**: Patch IMMEDIATELY. CVSS 9.8 means it's an easy target for widespread automated attacks. Do not ignore.