Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks) | SODOLA SL902-SWTGW124AS | 0 ~ 200.1.20 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-27751 | 9.8 CRITICAL | SODOLA SL902-SWTGW124AS <= 200.1.20 Use of Default Credentials |
| CVE-2026-27755 | 9.8 CRITICAL | SODOLA SL902-SWTGW124AS <= 200.1.20 Predictable Session ID |
| CVE-2026-27757 | 7.1 HIGH | SODOLA SL902-SWTGW124AS <= 200.1.20 Unverified Password Change |
| CVE-2026-27753 | 6.5 MEDIUM | SODOLA SL902-SWTGW124AS <= 200.1.20 Improper Login Rate Limiting |
| CVE-2026-27754 | 6.5 MEDIUM | SODOLA SL902-SWTGW124AS <= 200.1.20 MD5 Session Token Generation |
| CVE-2026-27756 | 6.1 MEDIUM | SODOLA SL902-SWTGW124AS <= 200.1.20 Reflected XSS in Management Interface |
| CVE-2026-27758 | 4.3 MEDIUM | SODOLA SL902-SWTGW124AS <= 200.1.20 Missing CSRF Protections |
No comments yet