CVE-2025-15573: CWE-295 Improper Certificate Validation in SolaX Power Pocket WiFi 3.0
The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.
AI Analysis
Technical Summary
CVE-2025-15573 identifies a critical security vulnerability in SolaX Pocket WiFi 3.0 devices related to improper certificate validation (CWE-295) during MQTT connections. Specifically, the affected devices fail to validate the server's TLS certificate when connecting to the SolaX Cloud MQTT server hosted on Alibaba Cloud (mqtt001.solaxcloud.com, TCP port 8883). This lack of validation allows an attacker positioned as a man-in-the-middle (MitM) to impersonate the legitimate MQTT server. By doing so, the attacker can issue arbitrary MQTT commands to the devices, potentially controlling or disrupting their operation. The vulnerability affects all device versions prior to 3.022.03, with no patches currently available. The MQTT protocol is commonly used for lightweight messaging in IoT and network devices, making this vulnerability particularly concerning for device integrity and operational reliability. Although no exploits have been reported in the wild, the vulnerability's nature means it can be exploited without authentication or user interaction, increasing its risk profile. The flaw compromises the confidentiality and integrity of device-cloud communications and may impact availability if malicious commands cause device malfunction or denial of service. The vulnerability was published on February 12, 2026, and is tracked under CWE-295, which relates to improper certificate validation leading to trust issues in secure communications.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on SolaX Pocket WiFi 3.0 devices for critical communications or IoT infrastructure. The ability of an attacker to impersonate the MQTT server and send arbitrary commands could lead to unauthorized control, data manipulation, or service disruption. This can compromise operational continuity, data integrity, and potentially expose sensitive information transmitted between devices and cloud services. Industrial, energy, and smart building sectors using these devices may face operational outages or safety risks. Additionally, the vulnerability could be leveraged for lateral movement within networks or as a foothold for broader attacks. The lack of certificate validation undermines the trust model of TLS connections, making encrypted communications vulnerable to interception and tampering. Given the widespread use of MQTT in IoT deployments, the impact extends beyond individual devices to the broader ecosystem relying on secure device-cloud interactions.
Mitigation Recommendations
Immediate mitigation steps include network-level controls such as deploying TLS interception detection, enforcing strict firewall rules to limit MQTT traffic to trusted sources, and monitoring network traffic for anomalous MQTT commands. Organizations should isolate affected devices on segmented networks to reduce exposure. Since no patch is currently available, users should avoid connecting devices over untrusted networks or VPNs that could be compromised. Implementing additional authentication or message validation mechanisms at the application layer can help detect unauthorized commands. Regularly auditing device firmware versions and preparing for prompt updates once patches are released is critical. Vendors and integrators should be engaged to prioritize patch development and deployment. Security teams should also educate users about the risks of connecting devices to insecure networks and monitor for signs of compromise or unusual device behavior.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-15573: CWE-295 Improper Certificate Validation in SolaX Power Pocket WiFi 3.0
Description
The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.
AI-Powered Analysis
Technical Analysis
CVE-2025-15573 identifies a critical security vulnerability in SolaX Pocket WiFi 3.0 devices related to improper certificate validation (CWE-295) during MQTT connections. Specifically, the affected devices fail to validate the server's TLS certificate when connecting to the SolaX Cloud MQTT server hosted on Alibaba Cloud (mqtt001.solaxcloud.com, TCP port 8883). This lack of validation allows an attacker positioned as a man-in-the-middle (MitM) to impersonate the legitimate MQTT server. By doing so, the attacker can issue arbitrary MQTT commands to the devices, potentially controlling or disrupting their operation. The vulnerability affects all device versions prior to 3.022.03, with no patches currently available. The MQTT protocol is commonly used for lightweight messaging in IoT and network devices, making this vulnerability particularly concerning for device integrity and operational reliability. Although no exploits have been reported in the wild, the vulnerability's nature means it can be exploited without authentication or user interaction, increasing its risk profile. The flaw compromises the confidentiality and integrity of device-cloud communications and may impact availability if malicious commands cause device malfunction or denial of service. The vulnerability was published on February 12, 2026, and is tracked under CWE-295, which relates to improper certificate validation leading to trust issues in secure communications.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on SolaX Pocket WiFi 3.0 devices for critical communications or IoT infrastructure. The ability of an attacker to impersonate the MQTT server and send arbitrary commands could lead to unauthorized control, data manipulation, or service disruption. This can compromise operational continuity, data integrity, and potentially expose sensitive information transmitted between devices and cloud services. Industrial, energy, and smart building sectors using these devices may face operational outages or safety risks. Additionally, the vulnerability could be leveraged for lateral movement within networks or as a foothold for broader attacks. The lack of certificate validation undermines the trust model of TLS connections, making encrypted communications vulnerable to interception and tampering. Given the widespread use of MQTT in IoT deployments, the impact extends beyond individual devices to the broader ecosystem relying on secure device-cloud interactions.
Mitigation Recommendations
Immediate mitigation steps include network-level controls such as deploying TLS interception detection, enforcing strict firewall rules to limit MQTT traffic to trusted sources, and monitoring network traffic for anomalous MQTT commands. Organizations should isolate affected devices on segmented networks to reduce exposure. Since no patch is currently available, users should avoid connecting devices over untrusted networks or VPNs that could be compromised. Implementing additional authentication or message validation mechanisms at the application layer can help detect unauthorized commands. Regularly auditing device firmware versions and preparing for prompt updates once patches are released is critical. Vendors and integrators should be engaged to prioritize patch development and deployment. Security teams should also educate users about the risks of connecting devices to insecure networks and monitor for signs of compromise or unusual device behavior.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2026-02-09T09:43:49.723Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698db3acc9e1ff5ad8c09726
Added to database: 2/12/2026, 11:04:12 AM
Last enriched: 2/12/2026, 11:18:31 AM
Last updated: 2/12/2026, 1:12:08 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15575: CWE-494 Download of Code Without Integrity Check in SolaX Power Pocket WiFi 3.0
HighCVE-2025-15574: CWE-330 Use of Insufficiently Random Values in SolaX Power Pocket WiFi 3.0
HighCVE-2026-2276: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in https://www.lavanguardia.com/vida/20260212/11464294/webs-grupo-godo-sufren-ciberataque.html web application
MediumCVE-2026-1356: CWE-918 Server-Side Request Forgery (SSRF) in mateuszgbiorczyk Converter for Media – Optimize images | Convert WebP & AVIF
MediumCVE-2026-21722: Vulnerability in Grafana grafana/grafana
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.