CVE-2023-35835: n/a in n/a
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. The device provides a WiFi access point for initial configuration. The WiFi network provided has no network authentication (such as an encryption key) and persists permanently, including after enrollment and setup is complete. The WiFi network serves a web-based configuration utility, as well as an unauthenticated ModBus protocol interface.
AI Analysis
Technical Summary
CVE-2023-35835 is a critical vulnerability affecting the SolaX Pocket WiFi 3 device, versions up to 3.001.02. This device is designed to provide a WiFi access point primarily for initial configuration purposes. However, the vulnerability arises because the WiFi network it broadcasts is permanently open—lacking any form of network authentication such as WPA2/WPA3 encryption keys. This open network remains active even after the device has been enrolled and setup is complete, which is a significant security oversight. The exposed WiFi network hosts a web-based configuration utility and an unauthenticated ModBus protocol interface. ModBus is a communication protocol commonly used in industrial environments for supervisory control and data acquisition (SCADA) systems. The absence of authentication on these interfaces means that any attacker within wireless range can connect to the device, access the configuration utility, and interact with the ModBus interface without restriction. This can lead to unauthorized configuration changes, data theft, or disruption of device operation. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity, with attack vector being network (remote), no privileges or user interaction required, and impacts on confidentiality, integrity, and availability all rated high. Although no known exploits in the wild have been reported yet, the ease of exploitation and the critical impact make this a significant threat. The lack of vendor or product-specific details beyond the device name limits the scope of direct vendor mitigation guidance, but the technical nature of the vulnerability is clear and straightforward.
Potential Impact
For European organizations, especially those involved in energy management, industrial automation, or smart grid deployments where SolaX Pocket WiFi 3 devices might be used, this vulnerability poses a severe risk. Attackers can gain unauthorized access to device configurations and control interfaces, potentially leading to manipulation of energy data, disruption of energy flow, or denial of service conditions. This can affect operational continuity, cause financial losses, and damage trust in critical infrastructure. The unauthenticated ModBus interface is particularly concerning as it is often used in industrial control systems; unauthorized commands could lead to unsafe operational states or equipment damage. Confidentiality breaches could expose sensitive operational data, while integrity and availability impacts could disrupt services. Given the permanent nature of the open WiFi network, attackers do not need to wait for initial setup phases, increasing the window of exposure. This vulnerability could also facilitate lateral movement within a network if the device is connected to broader enterprise or industrial networks. The critical CVSS score underscores the urgency for European organizations to address this issue promptly to avoid potential exploitation.
Mitigation Recommendations
1. Immediate network segmentation: Isolate the SolaX Pocket WiFi 3 devices on a dedicated VLAN or network segment with strict access controls to limit exposure to authorized personnel only. 2. Disable or restrict the WiFi access point if possible: If the device firmware or configuration allows, disable the open WiFi network after initial setup or restrict its broadcast range to minimize attacker proximity. 3. Implement physical security controls: Ensure devices are located in secure areas to prevent unauthorized physical access or proximity-based attacks. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous activity targeting the device’s IP addresses or ModBus protocol communications. 5. Use network-level authentication and encryption: If the device supports firmware updates or configuration changes, request or apply patches that enable WiFi authentication and encryption. 6. Vendor engagement: Contact the device manufacturer or vendor for firmware updates or security advisories addressing this vulnerability. 7. Disable or restrict ModBus interface access: If possible, configure the device to require authentication for ModBus or disable it if not needed. 8. Audit and log access: Maintain detailed logs of access to the device’s configuration utility and ModBus interface to detect unauthorized attempts. 9. Consider alternative devices: For new deployments, evaluate alternative devices with stronger security postures and authentication mechanisms. These mitigations go beyond generic advice by focusing on network architecture, physical security, and active monitoring tailored to the specific vulnerability characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Denmark
CVE-2023-35835: n/a in n/a
Description
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. The device provides a WiFi access point for initial configuration. The WiFi network provided has no network authentication (such as an encryption key) and persists permanently, including after enrollment and setup is complete. The WiFi network serves a web-based configuration utility, as well as an unauthenticated ModBus protocol interface.
AI-Powered Analysis
Technical Analysis
CVE-2023-35835 is a critical vulnerability affecting the SolaX Pocket WiFi 3 device, versions up to 3.001.02. This device is designed to provide a WiFi access point primarily for initial configuration purposes. However, the vulnerability arises because the WiFi network it broadcasts is permanently open—lacking any form of network authentication such as WPA2/WPA3 encryption keys. This open network remains active even after the device has been enrolled and setup is complete, which is a significant security oversight. The exposed WiFi network hosts a web-based configuration utility and an unauthenticated ModBus protocol interface. ModBus is a communication protocol commonly used in industrial environments for supervisory control and data acquisition (SCADA) systems. The absence of authentication on these interfaces means that any attacker within wireless range can connect to the device, access the configuration utility, and interact with the ModBus interface without restriction. This can lead to unauthorized configuration changes, data theft, or disruption of device operation. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity, with attack vector being network (remote), no privileges or user interaction required, and impacts on confidentiality, integrity, and availability all rated high. Although no known exploits in the wild have been reported yet, the ease of exploitation and the critical impact make this a significant threat. The lack of vendor or product-specific details beyond the device name limits the scope of direct vendor mitigation guidance, but the technical nature of the vulnerability is clear and straightforward.
Potential Impact
For European organizations, especially those involved in energy management, industrial automation, or smart grid deployments where SolaX Pocket WiFi 3 devices might be used, this vulnerability poses a severe risk. Attackers can gain unauthorized access to device configurations and control interfaces, potentially leading to manipulation of energy data, disruption of energy flow, or denial of service conditions. This can affect operational continuity, cause financial losses, and damage trust in critical infrastructure. The unauthenticated ModBus interface is particularly concerning as it is often used in industrial control systems; unauthorized commands could lead to unsafe operational states or equipment damage. Confidentiality breaches could expose sensitive operational data, while integrity and availability impacts could disrupt services. Given the permanent nature of the open WiFi network, attackers do not need to wait for initial setup phases, increasing the window of exposure. This vulnerability could also facilitate lateral movement within a network if the device is connected to broader enterprise or industrial networks. The critical CVSS score underscores the urgency for European organizations to address this issue promptly to avoid potential exploitation.
Mitigation Recommendations
1. Immediate network segmentation: Isolate the SolaX Pocket WiFi 3 devices on a dedicated VLAN or network segment with strict access controls to limit exposure to authorized personnel only. 2. Disable or restrict the WiFi access point if possible: If the device firmware or configuration allows, disable the open WiFi network after initial setup or restrict its broadcast range to minimize attacker proximity. 3. Implement physical security controls: Ensure devices are located in secure areas to prevent unauthorized physical access or proximity-based attacks. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous activity targeting the device’s IP addresses or ModBus protocol communications. 5. Use network-level authentication and encryption: If the device supports firmware updates or configuration changes, request or apply patches that enable WiFi authentication and encryption. 6. Vendor engagement: Contact the device manufacturer or vendor for firmware updates or security advisories addressing this vulnerability. 7. Disable or restrict ModBus interface access: If possible, configure the device to require authentication for ModBus or disable it if not needed. 8. Audit and log access: Maintain detailed logs of access to the device’s configuration utility and ModBus interface to detect unauthorized attempts. 9. Consider alternative devices: For new deployments, evaluate alternative devices with stronger security postures and authentication mechanisms. These mitigations go beyond generic advice by focusing on network architecture, physical security, and active monitoring tailored to the specific vulnerability characteristics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-06-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b43560
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:25:48 PM
Last updated: 8/11/2025, 7:09:34 AM
Views: 14
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.