sodola-network CVE Vulnerabilities & Metrics

Focus on sodola-network vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About sodola-network Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with sodola-network. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total sodola-network CVEs: 8
Earliest CVE date: 27 Feb 2026, 18:16 UTC
Latest CVE date: 27 Feb 2026, 19:16 UTC

Latest CVE reference: CVE-2026-27758

Rolling Stats

30-day Count (Rolling): 8
365-day Count (Rolling): 8

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical sodola-network CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.0

Max CVSS: 0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 0
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS sodola-network CVEs

These are the five CVEs with the highest CVSS scores for sodola-network, sorted by severity first and recency.

All CVEs for sodola-network

CVE-2026-27758 sodola-network vulnerability CVSS: 0 27 Feb 2026, 19:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a cross-site request forgery vulnerability in its management interface that allows attackers to induce authenticated users into submitting forged requests. Attackers can craft malicious requests that execute unauthorized configuration or administrative actions with the victim's privileges when the authenticated user visits a malicious webpage.

CVE-2026-27757 sodola-network vulnerability CVSS: 0 27 Feb 2026, 19:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication vulnerability that allows authenticated users to change account passwords without verifying the current password. Attackers who gain access to an authenticated session can modify credentials to maintain persistent access to the management interface.

CVE-2026-27756 sodola-network vulnerability CVSS: 0 27 Feb 2026, 19:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a reflected cross-site scripting vulnerability in the management interface where user input is not properly encoded before output. Attackers can craft malicious URLs that execute arbitrary JavaScript in the web interface when visited by authenticated users.

CVE-2026-27755 sodola-network vulnerability CVSS: 0 27 Feb 2026, 19:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability that allows attackers to forge authenticated sessions by computing predictable MD5-based cookies. Attackers who know or guess valid credentials can calculate the session identifier offline and bypass authentication without completing the login flow, gaining unauthorized access to the device.

CVE-2026-27754 sodola-network vulnerability CVSS: 0 27 Feb 2026, 19:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.

CVE-2026-27753 sodola-network vulnerability CVSS: 0 27 Feb 2026, 18:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnerability that allows remote attackers to perform unlimited login attempts against the management interface. Attackers can conduct online password guessing attacks without account lockout or rate limiting restrictions to gain unauthorized access to the device management interface.

CVE-2026-27752 sodola-network vulnerability CVSS: 0 27 Feb 2026, 18:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.

CVE-2026-27751 sodola-network vulnerability CVSS: 0 27 Feb 2026, 18:16 UTC

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.