CVE-2025-15574

MEDIUM

Solax Cloud MQTT - Authentication Bypass

Title source: llm
STIX 2.1

Description

When connecting to the Solax Cloud MQTT server the username is the "registration number", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the "registration number" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.

Scores

CVSS v3 6.5
EPSS 0.0004
EPSS Percentile 12.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-330
Status published
Products (5)
SolaX Power/Pocket WiFi 3.0 <3.022.03
SolaX Power/Pocket WiFi 4.0 <003.03
SolaX Power/Pocket WiFi+4GM <1.005.05
SolaX Power/Pocket WiFi+LAN <1.009.02
SolaX Power/Pocket WiFi+LAN 2.0 <006.06
Published Feb 12, 2026
Tracked Since Feb 18, 2026