CVE-2025-15574 PUBLISHED

Insecure Credential Generation for Solax Power Pocket WiFi models MQTT Cloud Connection

Assigner: SEC-VLab
Reserved: 09.02.2026 Published: 12.02.2026 Updated: 12.02.2026

When connecting to the Solax Cloud MQTT server the username is the "registration number", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the "registration number" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.

Product Status

Vendor SolaX Power
Product Pocket WiFi 3.0
Versions Default: unaffected
  • Version <3.022.03 is affected
Vendor SolaX Power
Product Pocket WiFi+LAN
Versions Default: unaffected
  • Version <1.009.02 is affected
Vendor SolaX Power
Product Pocket WiFi+4GM
Versions Default: unaffected
  • Version <1.005.05 is affected
Vendor SolaX Power
Product Pocket WiFi+LAN 2.0
Versions Default: unaffected
  • Version <006.06 is affected
Vendor SolaX Power
Product Pocket WiFi 4.0
Versions Default: unaffected
  • Version <003.03 is affected

Solutions

The vendor provides patches for the affected Pocket models which can be obtained throw their customer's Solax Cloud account and using the Pocket firmware upgrade function there.

As of February 10, 2026, the firmware versions for each affected Pocket model are as follows according to the vendor: 1. Pocket WiFi 3.0 – (3.022.03) 2. Pocket WiFi+LAN – (1.009.02) 3. Pocket WiFi+4GM – (1.005.05) 4. Pocket WiFi+LAN 2.0 – (006.06) 5. Pocket WiFi 4.0 – (003.03)

The vendor provided the following further information regarding EV Charger and Adapter Box: 1. EV Charger: The WiFi module firmware supports digital signature, but only one-way authentication is implemented. 2. Adapter Box: The WiFi module firmware supports two-way authentication and digital signature.

Credits

  • Stefan Viehböck, SEC Consult Vulnerability Lab finder

References

Problem Types

  • CWE-330 Use of Insufficiently Random Values CWE

Impacts

  • CAPEC-21 Exploitation of Trusted Identifiers