CVE-2025-15575: CWE-494 Download of Code Without Integrity Check in SolaX Power Pocket WiFi 3.0
CVE-2025-15575 is a vulnerability in the SolaX Power Pocket WiFi 3. 0 device firmware update process, where the device does not verify the authenticity of firmware update files. This lack of cryptographic integrity checks allows attackers to flash malicious firmware, potentially gaining full control over the device. The device also does not leverage ESP32 security features such as secure boot, increasing the risk of persistent compromise. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if exploited. European organizations using this device could face confidentiality, integrity, and availability impacts, especially in critical infrastructure or industrial environments. Mitigation requires vendor firmware updates that implement cryptographic signature verification and secure boot, alongside network-level protections and strict update policies. Countries with higher adoption of SolaX Power products, particularly those with renewable energy infrastructure, are more likely to be affected. Given the ease of exploitation and potential for full device compromise, this vulnerability is assessed as high severity.
AI Analysis
Technical Summary
CVE-2025-15575 identifies a critical security weakness in the firmware update mechanism of the SolaX Power Pocket WiFi 3.0 device, specifically versions earlier than 3.022.03. The vulnerability stems from the absence of any cryptographic integrity or authenticity checks on firmware update files. This means that the device accepts and installs firmware updates without verifying digital signatures or other cryptographic proofs, violating secure update best practices. Additionally, the device's underlying ESP32 microcontroller security features, such as secure boot, are not utilized, which would otherwise prevent unauthorized firmware execution. An attacker with network access or the ability to deliver a malicious firmware update can exploit this flaw to flash arbitrary firmware, potentially gaining persistent control over the device. This could lead to device manipulation, data interception, or use as a foothold for lateral movement within a network. Although no public exploits are currently known, the vulnerability's nature and lack of mitigations make it a high-risk issue. The absence of cryptographic protections in firmware updates is a classic CWE-494 weakness, which has historically led to severe compromises in embedded and IoT devices. The vulnerability was published in February 2026, with no patch currently available, emphasizing the need for immediate attention from users and vendors.
Potential Impact
For European organizations, the exploitation of this vulnerability could have severe consequences. The Pocket WiFi 3.0 device is likely used in environments requiring reliable and secure wireless connectivity, including renewable energy installations, industrial control systems, or remote monitoring setups. A compromised device could allow attackers to intercept sensitive communications, disrupt network availability, or pivot to other critical systems. This could lead to operational downtime, data breaches, or sabotage of infrastructure. Given the device’s role in connectivity, availability impacts could be significant, affecting business continuity. Confidentiality and integrity of data transmitted through or managed by the device are also at risk. The lack of secure boot means that malicious firmware could persist across reboots, complicating detection and remediation. European organizations in sectors such as energy, manufacturing, and critical infrastructure are particularly at risk due to their reliance on secure IoT and network devices. The absence of known exploits currently provides a window for proactive mitigation, but the potential impact remains high if attackers develop exploit code.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to the Pocket WiFi 3.0 devices to trusted management networks only, minimizing exposure to untrusted sources. Organizations should implement network segmentation to isolate these devices from critical infrastructure. Monitoring network traffic for unusual firmware update attempts or unexpected device behavior can aid early detection. Since no official patches are currently available, users should engage with SolaX Power to demand firmware updates that incorporate cryptographic signature verification and enable ESP32 secure boot features. Until patches are released, organizations should consider disabling remote firmware update capabilities if possible or applying manual update procedures verified through secure channels. Employing endpoint detection and response (EDR) tools that can identify anomalous device behavior may also help. Finally, maintaining an inventory of affected devices and prioritizing their replacement or upgrade in critical environments is advisable.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-15575: CWE-494 Download of Code Without Integrity Check in SolaX Power Pocket WiFi 3.0
Description
CVE-2025-15575 is a vulnerability in the SolaX Power Pocket WiFi 3. 0 device firmware update process, where the device does not verify the authenticity of firmware update files. This lack of cryptographic integrity checks allows attackers to flash malicious firmware, potentially gaining full control over the device. The device also does not leverage ESP32 security features such as secure boot, increasing the risk of persistent compromise. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if exploited. European organizations using this device could face confidentiality, integrity, and availability impacts, especially in critical infrastructure or industrial environments. Mitigation requires vendor firmware updates that implement cryptographic signature verification and secure boot, alongside network-level protections and strict update policies. Countries with higher adoption of SolaX Power products, particularly those with renewable energy infrastructure, are more likely to be affected. Given the ease of exploitation and potential for full device compromise, this vulnerability is assessed as high severity.
AI-Powered Analysis
Technical Analysis
CVE-2025-15575 identifies a critical security weakness in the firmware update mechanism of the SolaX Power Pocket WiFi 3.0 device, specifically versions earlier than 3.022.03. The vulnerability stems from the absence of any cryptographic integrity or authenticity checks on firmware update files. This means that the device accepts and installs firmware updates without verifying digital signatures or other cryptographic proofs, violating secure update best practices. Additionally, the device's underlying ESP32 microcontroller security features, such as secure boot, are not utilized, which would otherwise prevent unauthorized firmware execution. An attacker with network access or the ability to deliver a malicious firmware update can exploit this flaw to flash arbitrary firmware, potentially gaining persistent control over the device. This could lead to device manipulation, data interception, or use as a foothold for lateral movement within a network. Although no public exploits are currently known, the vulnerability's nature and lack of mitigations make it a high-risk issue. The absence of cryptographic protections in firmware updates is a classic CWE-494 weakness, which has historically led to severe compromises in embedded and IoT devices. The vulnerability was published in February 2026, with no patch currently available, emphasizing the need for immediate attention from users and vendors.
Potential Impact
For European organizations, the exploitation of this vulnerability could have severe consequences. The Pocket WiFi 3.0 device is likely used in environments requiring reliable and secure wireless connectivity, including renewable energy installations, industrial control systems, or remote monitoring setups. A compromised device could allow attackers to intercept sensitive communications, disrupt network availability, or pivot to other critical systems. This could lead to operational downtime, data breaches, or sabotage of infrastructure. Given the device’s role in connectivity, availability impacts could be significant, affecting business continuity. Confidentiality and integrity of data transmitted through or managed by the device are also at risk. The lack of secure boot means that malicious firmware could persist across reboots, complicating detection and remediation. European organizations in sectors such as energy, manufacturing, and critical infrastructure are particularly at risk due to their reliance on secure IoT and network devices. The absence of known exploits currently provides a window for proactive mitigation, but the potential impact remains high if attackers develop exploit code.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to the Pocket WiFi 3.0 devices to trusted management networks only, minimizing exposure to untrusted sources. Organizations should implement network segmentation to isolate these devices from critical infrastructure. Monitoring network traffic for unusual firmware update attempts or unexpected device behavior can aid early detection. Since no official patches are currently available, users should engage with SolaX Power to demand firmware updates that incorporate cryptographic signature verification and enable ESP32 secure boot features. Until patches are released, organizations should consider disabling remote firmware update capabilities if possible or applying manual update procedures verified through secure channels. Employing endpoint detection and response (EDR) tools that can identify anomalous device behavior may also help. Finally, maintaining an inventory of affected devices and prioritizing their replacement or upgrade in critical environments is advisable.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2026-02-09T09:43:52.314Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698db73dc9e1ff5ad8c38fa1
Added to database: 2/12/2026, 11:19:25 AM
Last enriched: 2/12/2026, 11:33:32 AM
Last updated: 2/12/2026, 12:23:27 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15574: CWE-330 Use of Insufficiently Random Values in SolaX Power Pocket WiFi 3.0
HighCVE-2025-15573: CWE-295 Improper Certificate Validation in SolaX Power Pocket WiFi 3.0
UnknownCVE-2026-2276: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in https://www.lavanguardia.com/vida/20260212/11464294/webs-grupo-godo-sufren-ciberataque.html web application
MediumCVE-2026-1356: CWE-918 Server-Side Request Forgery (SSRF) in mateuszgbiorczyk Converter for Media – Optimize images | Convert WebP & AVIF
MediumCVE-2026-21722: Vulnerability in Grafana grafana/grafana
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.