Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15575: CWE-494 Download of Code Without Integrity Check in SolaX Power Pocket WiFi 3.0

0
High
VulnerabilityCVE-2025-15575cvecve-2025-15575cwe-494
Published: Thu Feb 12 2026 (02/12/2026, 10:51:44 UTC)
Source: CVE Database V5
Vendor/Project: SolaX Power
Product: Pocket WiFi 3.0

Description

CVE-2025-15575 is a vulnerability in the SolaX Power Pocket WiFi 3. 0 device firmware update process, where the device does not verify the authenticity of firmware update files. This lack of cryptographic integrity checks allows attackers to flash malicious firmware, potentially gaining full control over the device. The device also does not leverage ESP32 security features such as secure boot, increasing the risk of persistent compromise. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if exploited. European organizations using this device could face confidentiality, integrity, and availability impacts, especially in critical infrastructure or industrial environments. Mitigation requires vendor firmware updates that implement cryptographic signature verification and secure boot, alongside network-level protections and strict update policies. Countries with higher adoption of SolaX Power products, particularly those with renewable energy infrastructure, are more likely to be affected. Given the ease of exploitation and potential for full device compromise, this vulnerability is assessed as high severity.

AI-Powered Analysis

AILast updated: 02/12/2026, 11:33:32 UTC

Technical Analysis

CVE-2025-15575 identifies a critical security weakness in the firmware update mechanism of the SolaX Power Pocket WiFi 3.0 device, specifically versions earlier than 3.022.03. The vulnerability stems from the absence of any cryptographic integrity or authenticity checks on firmware update files. This means that the device accepts and installs firmware updates without verifying digital signatures or other cryptographic proofs, violating secure update best practices. Additionally, the device's underlying ESP32 microcontroller security features, such as secure boot, are not utilized, which would otherwise prevent unauthorized firmware execution. An attacker with network access or the ability to deliver a malicious firmware update can exploit this flaw to flash arbitrary firmware, potentially gaining persistent control over the device. This could lead to device manipulation, data interception, or use as a foothold for lateral movement within a network. Although no public exploits are currently known, the vulnerability's nature and lack of mitigations make it a high-risk issue. The absence of cryptographic protections in firmware updates is a classic CWE-494 weakness, which has historically led to severe compromises in embedded and IoT devices. The vulnerability was published in February 2026, with no patch currently available, emphasizing the need for immediate attention from users and vendors.

Potential Impact

For European organizations, the exploitation of this vulnerability could have severe consequences. The Pocket WiFi 3.0 device is likely used in environments requiring reliable and secure wireless connectivity, including renewable energy installations, industrial control systems, or remote monitoring setups. A compromised device could allow attackers to intercept sensitive communications, disrupt network availability, or pivot to other critical systems. This could lead to operational downtime, data breaches, or sabotage of infrastructure. Given the device’s role in connectivity, availability impacts could be significant, affecting business continuity. Confidentiality and integrity of data transmitted through or managed by the device are also at risk. The lack of secure boot means that malicious firmware could persist across reboots, complicating detection and remediation. European organizations in sectors such as energy, manufacturing, and critical infrastructure are particularly at risk due to their reliance on secure IoT and network devices. The absence of known exploits currently provides a window for proactive mitigation, but the potential impact remains high if attackers develop exploit code.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to the Pocket WiFi 3.0 devices to trusted management networks only, minimizing exposure to untrusted sources. Organizations should implement network segmentation to isolate these devices from critical infrastructure. Monitoring network traffic for unusual firmware update attempts or unexpected device behavior can aid early detection. Since no official patches are currently available, users should engage with SolaX Power to demand firmware updates that incorporate cryptographic signature verification and enable ESP32 secure boot features. Until patches are released, organizations should consider disabling remote firmware update capabilities if possible or applying manual update procedures verified through secure channels. Employing endpoint detection and response (EDR) tools that can identify anomalous device behavior may also help. Finally, maintaining an inventory of affected devices and prioritizing their replacement or upgrade in critical environments is advisable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2026-02-09T09:43:52.314Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698db73dc9e1ff5ad8c38fa1

Added to database: 2/12/2026, 11:19:25 AM

Last enriched: 2/12/2026, 11:33:32 AM

Last updated: 2/12/2026, 12:23:27 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats