Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-15573
PUBLISHED
More InfoOfficial Page
Assigner-SEC-VLab
Assigner Org ID-551230f0-3615-47bd-b7cc-93e92e730bbf
View Known Exploited Vulnerability (KEV) details
Published At-12 Feb, 2026 | 10:39
Updated At-12 Feb, 2026 | 14:48
Rejected At-
▼CVE Numbering Authority (CNA)
Missing Certificate Validation for Solax Power Pocket WiFi models MQTT Cloud Connection

The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.

Affected Products
Vendor
SolaX Power
Product
Pocket WiFi 3.0
Default Status
unaffected
Versions
Affected
  • <3.022.03
Vendor
SolaX Power
Product
Pocket WiFi+LAN
Default Status
unaffected
Versions
Affected
  • <1.009.02
Vendor
SolaX Power
Product
Pocket WiFi+4GM
Default Status
unaffected
Versions
Affected
  • <1.005.05
Vendor
SolaX Power
Product
Pocket WiFi+LAN 2.0
Default Status
unaffected
Versions
Affected
  • <006.06
Vendor
SolaX Power
Product
Pocket WiFi 4.0
Default Status
unaffected
Versions
Affected
  • <003.03
Problem Types
TypeCWE IDDescription
CWECWE-295CWE-295 Improper Certificate Validation
Type: CWE
CWE ID: CWE-295
Description: CWE-295 Improper Certificate Validation
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-94CAPEC-94 Adversary in the Middle (AiTM)
CAPEC ID: CAPEC-94
Description: CAPEC-94 Adversary in the Middle (AiTM)
Solutions

The vendor provides patches for the affected Pocket models which can be obtained throw their customer's Solax Cloud account and using the Pocket firmware upgrade function there. As of February 10, 2026, the firmware versions for each affected Pocket model are as follows according to the vendor: 1. Pocket WiFi 3.0 – (3.022.03) 2. Pocket WiFi+LAN – (1.009.02) 3. Pocket WiFi+4GM – (1.005.05) 4. Pocket WiFi+LAN 2.0 – (006.06) 5. Pocket WiFi 4.0 – (003.03) The vendor provided the following further information regarding EV Charger and Adapter Box: 1. EV Charger: The WiFi module firmware supports digital signature, but only one-way authentication is implemented. 2. Adapter Box: The WiFi module firmware supports two-way authentication and digital signature.

Configurations

Workarounds

Exploits

Credits

finder
Stefan Viehböck, SEC Consult Vulnerability Lab
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://r.sec-consult.com/solax
N/A
Hyperlink: https://r.sec-consult.com/solax
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.19.4CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Version: 3.1
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found