CVE-2025-15574: CWE-330 Use of Insufficiently Random Values in SolaX Power Pocket WiFi 3.0
CVE-2025-15574 is a vulnerability in the SolaX Power Pocket WiFi 3. 0 device where weak password derivation from a publicly visible registration number allows attackers to impersonate devices on the Solax Cloud MQTT server. The password is generated using a proprietary XOR/transposition algorithm from the registration number, which is a 10-character string printed on the device and its QR code. Attackers who obtain these registration numbers can connect to the MQTT server, potentially controlling or spoofing the device communications. This flaw arises from the use of insufficiently random values (CWE-330) for authentication credentials. There are no known exploits in the wild yet, and no CVSS score has been assigned. The vulnerability affects versions prior to 3. 022. 03 of the Pocket WiFi 3. 0.
AI Analysis
Technical Summary
CVE-2025-15574 is a security vulnerability identified in the SolaX Power Pocket WiFi 3.0 device, specifically affecting versions earlier than 3.022.03. The vulnerability stems from the use of insufficiently random values (CWE-330) in the authentication mechanism connecting the device to the Solax Cloud MQTT server. The authentication process uses a username that is the device's registration number—a 10-character string printed directly on the device and encoded in its QR code. The password is derived from this registration number through a proprietary XOR and transposition algorithm, which does not provide sufficient entropy or unpredictability. Consequently, an attacker who obtains the registration number can compute or guess the password and connect to the MQTT server, impersonating the Pocket WiFi dongle or connected inverters. This impersonation could allow attackers to send false data, disrupt device operation, or interfere with energy management systems relying on these devices. The vulnerability is particularly concerning because the registration number is physically exposed on the device, making it accessible to anyone with physical proximity or access to images of the device. No public exploits have been reported yet, and no official patch links are currently available, though the vendor has presumably reserved the CVE and may release updates. The lack of a CVSS score indicates the need for an independent severity assessment. The weakness in cryptographic design and exposure of authentication credentials make this a significant threat to the integrity and availability of solar power infrastructure using these devices.
Potential Impact
For European organizations, especially those deploying SolaX Power Pocket WiFi 3.0 devices and inverters, this vulnerability poses a risk of unauthorized access and control over solar energy equipment. Attackers could impersonate legitimate devices to manipulate data sent to cloud services, potentially causing incorrect energy reporting, disrupting energy production monitoring, or interfering with grid management systems. This could lead to financial losses, operational disruptions, and reduced trust in renewable energy infrastructure. The impact is more pronounced in countries with high solar adoption and where these devices are widely deployed in residential, commercial, or industrial settings. Additionally, compromised devices could be leveraged as entry points into broader network environments, increasing the risk of lateral movement and further compromise. The confidentiality of device credentials is at risk, and the integrity and availability of device communications can be undermined. While no exploits are known in the wild, the ease of obtaining registration numbers and the weak password derivation method increase the likelihood of exploitation once attackers target these devices.
Mitigation Recommendations
1. Immediate physical security measures should be enforced to prevent unauthorized individuals from accessing or photographing the devices to obtain registration numbers. 2. Organizations should monitor network traffic to and from the Solax Cloud MQTT server for unusual connection attempts or device impersonation indicators. 3. Engage with SolaX Power for firmware updates and apply patches as soon as they become available to address this vulnerability. 4. If possible, disable remote MQTT connections or restrict them via network segmentation and firewall rules to trusted IP addresses only. 5. Implement anomaly detection on device telemetry data to identify suspicious behavior indicative of impersonation or manipulation. 6. Consider deploying additional authentication layers or VPN tunnels for MQTT communications to enhance security beyond the device’s native mechanism. 7. Educate staff and end-users about the risks of exposing device registration numbers publicly, including in photographs or social media posts. 8. For critical infrastructure, evaluate alternative devices or solutions with stronger authentication mechanisms until a secure patch is confirmed.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, United Kingdom
CVE-2025-15574: CWE-330 Use of Insufficiently Random Values in SolaX Power Pocket WiFi 3.0
Description
CVE-2025-15574 is a vulnerability in the SolaX Power Pocket WiFi 3. 0 device where weak password derivation from a publicly visible registration number allows attackers to impersonate devices on the Solax Cloud MQTT server. The password is generated using a proprietary XOR/transposition algorithm from the registration number, which is a 10-character string printed on the device and its QR code. Attackers who obtain these registration numbers can connect to the MQTT server, potentially controlling or spoofing the device communications. This flaw arises from the use of insufficiently random values (CWE-330) for authentication credentials. There are no known exploits in the wild yet, and no CVSS score has been assigned. The vulnerability affects versions prior to 3. 022. 03 of the Pocket WiFi 3. 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-15574 is a security vulnerability identified in the SolaX Power Pocket WiFi 3.0 device, specifically affecting versions earlier than 3.022.03. The vulnerability stems from the use of insufficiently random values (CWE-330) in the authentication mechanism connecting the device to the Solax Cloud MQTT server. The authentication process uses a username that is the device's registration number—a 10-character string printed directly on the device and encoded in its QR code. The password is derived from this registration number through a proprietary XOR and transposition algorithm, which does not provide sufficient entropy or unpredictability. Consequently, an attacker who obtains the registration number can compute or guess the password and connect to the MQTT server, impersonating the Pocket WiFi dongle or connected inverters. This impersonation could allow attackers to send false data, disrupt device operation, or interfere with energy management systems relying on these devices. The vulnerability is particularly concerning because the registration number is physically exposed on the device, making it accessible to anyone with physical proximity or access to images of the device. No public exploits have been reported yet, and no official patch links are currently available, though the vendor has presumably reserved the CVE and may release updates. The lack of a CVSS score indicates the need for an independent severity assessment. The weakness in cryptographic design and exposure of authentication credentials make this a significant threat to the integrity and availability of solar power infrastructure using these devices.
Potential Impact
For European organizations, especially those deploying SolaX Power Pocket WiFi 3.0 devices and inverters, this vulnerability poses a risk of unauthorized access and control over solar energy equipment. Attackers could impersonate legitimate devices to manipulate data sent to cloud services, potentially causing incorrect energy reporting, disrupting energy production monitoring, or interfering with grid management systems. This could lead to financial losses, operational disruptions, and reduced trust in renewable energy infrastructure. The impact is more pronounced in countries with high solar adoption and where these devices are widely deployed in residential, commercial, or industrial settings. Additionally, compromised devices could be leveraged as entry points into broader network environments, increasing the risk of lateral movement and further compromise. The confidentiality of device credentials is at risk, and the integrity and availability of device communications can be undermined. While no exploits are known in the wild, the ease of obtaining registration numbers and the weak password derivation method increase the likelihood of exploitation once attackers target these devices.
Mitigation Recommendations
1. Immediate physical security measures should be enforced to prevent unauthorized individuals from accessing or photographing the devices to obtain registration numbers. 2. Organizations should monitor network traffic to and from the Solax Cloud MQTT server for unusual connection attempts or device impersonation indicators. 3. Engage with SolaX Power for firmware updates and apply patches as soon as they become available to address this vulnerability. 4. If possible, disable remote MQTT connections or restrict them via network segmentation and firewall rules to trusted IP addresses only. 5. Implement anomaly detection on device telemetry data to identify suspicious behavior indicative of impersonation or manipulation. 6. Consider deploying additional authentication layers or VPN tunnels for MQTT communications to enhance security beyond the device’s native mechanism. 7. Educate staff and end-users about the risks of exposing device registration numbers publicly, including in photographs or social media posts. 8. For critical infrastructure, evaluate alternative devices or solutions with stronger authentication mechanisms until a secure patch is confirmed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2026-02-09T09:43:51.017Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698db73dc9e1ff5ad8c38f9e
Added to database: 2/12/2026, 11:19:25 AM
Last enriched: 2/12/2026, 11:33:47 AM
Last updated: 2/12/2026, 12:21:42 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15575: CWE-494 Download of Code Without Integrity Check in SolaX Power Pocket WiFi 3.0
HighCVE-2025-15573: CWE-295 Improper Certificate Validation in SolaX Power Pocket WiFi 3.0
UnknownCVE-2026-2276: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in https://www.lavanguardia.com/vida/20260212/11464294/webs-grupo-godo-sufren-ciberataque.html web application
MediumCVE-2026-1356: CWE-918 Server-Side Request Forgery (SSRF) in mateuszgbiorczyk Converter for Media – Optimize images | Convert WebP & AVIF
MediumCVE-2026-21722: Vulnerability in Grafana grafana/grafana
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.