Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15573: CWE-295 Improper Certificate Validation in SolaX Power Pocket WiFi 3.0

0
Critical
VulnerabilityCVE-2025-15573cvecve-2025-15573cwe-295
Published: Thu Feb 12 2026 (02/12/2026, 10:39:35 UTC)
Source: CVE Database V5
Vendor/Project: SolaX Power
Product: Pocket WiFi 3.0

Description

The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 14:12:14 UTC

Technical Analysis

CVE-2025-15573 is a vulnerability identified in the SolaX Power Pocket WiFi 3.0 devices, specifically affecting versions prior to 3.022.03. The root cause is improper certificate validation (CWE-295) during the establishment of a secure MQTT connection to the SolaX Cloud MQTTS server hosted on Alibaba Cloud (mqtt001.solaxcloud.com, TCP port 8883). The devices do not verify the server's TLS certificate, which is a critical step in ensuring the authenticity of the server endpoint. This flaw enables an attacker positioned in a man-in-the-middle (MitM) role to impersonate the legitimate MQTT server by presenting a fraudulent certificate. Consequently, the attacker can issue arbitrary MQTT commands to the affected devices, potentially controlling device behavior or disrupting operations. The vulnerability requires no authentication or user interaction, and the attack vector is network-based, making exploitation feasible remotely if the attacker can intercept or redirect device traffic. The CVSS v3.1 score of 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L) indicates a critical severity with high confidentiality and integrity impact and low attack complexity. While no known exploits have been reported in the wild, the vulnerability represents a significant risk to the security and reliability of the affected IoT devices, particularly in environments where these devices are used for critical infrastructure or energy management. The lack of patch links suggests that a fix may be forthcoming but is not yet publicly available, emphasizing the need for proactive mitigation strategies.

Potential Impact

The impact of CVE-2025-15573 is severe for organizations using SolaX Power Pocket WiFi 3.0 devices in their infrastructure. Exploitation allows attackers to impersonate the cloud MQTT server and send arbitrary commands to devices, compromising device integrity and potentially causing unauthorized operational changes or disruptions. This can lead to loss of control over connected devices, data manipulation, and potential cascading failures in systems relying on these devices for connectivity or control, such as renewable energy installations or smart grid components. Confidentiality is also at risk since attackers can intercept and manipulate data streams. The vulnerability's network-based attack vector and lack of required authentication increase the likelihood of exploitation, especially in environments with insufficient network segmentation or monitoring. Organizations may face operational downtime, financial losses, and reputational damage if attackers leverage this vulnerability. Furthermore, the critical nature of the flaw could make these devices attractive targets for nation-state actors or cybercriminals aiming to disrupt energy infrastructure or IoT ecosystems.

Mitigation Recommendations

1. Immediate mitigation involves updating all affected SolaX Power Pocket WiFi 3.0 devices to firmware version 3.022.03 or later once the vendor releases a patch that properly validates server certificates. 2. Until patches are available, implement network-level controls such as strict firewall rules to restrict MQTT traffic to only trusted IP addresses and ports. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous MQTT traffic or TLS interception attempts. 4. Use TLS interception detection tools to identify man-in-the-middle attacks on MQTT connections. 5. Enforce network segmentation to isolate IoT devices from general enterprise networks, limiting exposure to potential attackers. 6. Monitor device logs and MQTT traffic for unusual command patterns or connection attempts. 7. Engage with the vendor for timely updates and security advisories. 8. Consider deploying additional endpoint security solutions on devices where feasible to detect unauthorized command execution. 9. Educate network administrators and security teams about the risks of improper certificate validation and the importance of secure MQTT communications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2026-02-09T09:43:49.723Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698db3acc9e1ff5ad8c09726

Added to database: 2/12/2026, 11:04:12 AM

Last enriched: 2/19/2026, 2:12:14 PM

Last updated: 3/29/2026, 6:32:03 PM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses