Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15574: CWE-330 Use of Insufficiently Random Values in SolaX Power Pocket WiFi 3.0

0
High
VulnerabilityCVE-2025-15574cvecve-2025-15574cwe-330
Published: Thu Feb 12 2026 (02/12/2026, 10:58:29 UTC)
Source: CVE Database V5
Vendor/Project: SolaX Power
Product: Pocket WiFi 3.0

Description

CVE-2025-15574 is a vulnerability in the SolaX Power Pocket WiFi 3. 0 device where weak password derivation from a publicly visible registration number allows attackers to impersonate devices on the Solax Cloud MQTT server. The password is generated using a proprietary XOR/transposition algorithm from the registration number, which is a 10-character string printed on the device and its QR code. Attackers who obtain these registration numbers can connect to the MQTT server, potentially controlling or spoofing the device communications. This flaw arises from the use of insufficiently random values (CWE-330) for authentication credentials. There are no known exploits in the wild yet, and no CVSS score has been assigned. The vulnerability affects versions prior to 3. 022. 03 of the Pocket WiFi 3. 0.

AI-Powered Analysis

AILast updated: 02/12/2026, 11:33:47 UTC

Technical Analysis

CVE-2025-15574 is a security vulnerability identified in the SolaX Power Pocket WiFi 3.0 device, specifically affecting versions earlier than 3.022.03. The vulnerability stems from the use of insufficiently random values (CWE-330) in the authentication mechanism connecting the device to the Solax Cloud MQTT server. The authentication process uses a username that is the device's registration number—a 10-character string printed directly on the device and encoded in its QR code. The password is derived from this registration number through a proprietary XOR and transposition algorithm, which does not provide sufficient entropy or unpredictability. Consequently, an attacker who obtains the registration number can compute or guess the password and connect to the MQTT server, impersonating the Pocket WiFi dongle or connected inverters. This impersonation could allow attackers to send false data, disrupt device operation, or interfere with energy management systems relying on these devices. The vulnerability is particularly concerning because the registration number is physically exposed on the device, making it accessible to anyone with physical proximity or access to images of the device. No public exploits have been reported yet, and no official patch links are currently available, though the vendor has presumably reserved the CVE and may release updates. The lack of a CVSS score indicates the need for an independent severity assessment. The weakness in cryptographic design and exposure of authentication credentials make this a significant threat to the integrity and availability of solar power infrastructure using these devices.

Potential Impact

For European organizations, especially those deploying SolaX Power Pocket WiFi 3.0 devices and inverters, this vulnerability poses a risk of unauthorized access and control over solar energy equipment. Attackers could impersonate legitimate devices to manipulate data sent to cloud services, potentially causing incorrect energy reporting, disrupting energy production monitoring, or interfering with grid management systems. This could lead to financial losses, operational disruptions, and reduced trust in renewable energy infrastructure. The impact is more pronounced in countries with high solar adoption and where these devices are widely deployed in residential, commercial, or industrial settings. Additionally, compromised devices could be leveraged as entry points into broader network environments, increasing the risk of lateral movement and further compromise. The confidentiality of device credentials is at risk, and the integrity and availability of device communications can be undermined. While no exploits are known in the wild, the ease of obtaining registration numbers and the weak password derivation method increase the likelihood of exploitation once attackers target these devices.

Mitigation Recommendations

1. Immediate physical security measures should be enforced to prevent unauthorized individuals from accessing or photographing the devices to obtain registration numbers. 2. Organizations should monitor network traffic to and from the Solax Cloud MQTT server for unusual connection attempts or device impersonation indicators. 3. Engage with SolaX Power for firmware updates and apply patches as soon as they become available to address this vulnerability. 4. If possible, disable remote MQTT connections or restrict them via network segmentation and firewall rules to trusted IP addresses only. 5. Implement anomaly detection on device telemetry data to identify suspicious behavior indicative of impersonation or manipulation. 6. Consider deploying additional authentication layers or VPN tunnels for MQTT communications to enhance security beyond the device’s native mechanism. 7. Educate staff and end-users about the risks of exposing device registration numbers publicly, including in photographs or social media posts. 8. For critical infrastructure, evaluate alternative devices or solutions with stronger authentication mechanisms until a secure patch is confirmed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2026-02-09T09:43:51.017Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698db73dc9e1ff5ad8c38f9e

Added to database: 2/12/2026, 11:19:25 AM

Last enriched: 2/12/2026, 11:33:47 AM

Last updated: 2/12/2026, 12:21:42 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats