The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.

Project Subscriptions

Vendors Products
Pocket Wifi 3 Subscribe
Solax Power Subscribe
Pocket Wifi+4gm Subscribe
Pocket Wifi+lan Subscribe
Pocket Wifi+lan 2.0 Subscribe
Pocket Wifi 4.0 Subscribe
Advisories

No advisories yet.

Fixes

Solution

The vendor provides patches for the affected Pocket models which can be obtained throw their customer's Solax Cloud account and using the Pocket firmware upgrade function there. As of February 10, 2026, the firmware versions for each affected Pocket model are as follows according to the vendor: 1. Pocket WiFi 3.0 – (3.022.03) 2. Pocket WiFi+LAN – (1.009.02) 3. Pocket WiFi+4GM – (1.005.05) 4. Pocket WiFi+LAN 2.0 – (006.06) 5. Pocket WiFi 4.0 – (003.03) The vendor provided the following further information regarding EV Charger and Adapter Box: 1. EV Charger: The WiFi module firmware supports digital signature, but only one-way authentication is implemented. 2. Adapter Box: The WiFi module firmware supports two-way authentication and digital signature.


Workaround

No workaround given by the vendor.

References
History

Thu, 12 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Solax
Solax pocket Wifi 3
Solax Power
Solax Power pocket Wifi+4gm
Solax Power pocket Wifi+lan
Solax Power pocket Wifi+lan 2.0
Solax Power pocket Wifi 4.0
Vendors & Products Solax
Solax pocket Wifi 3
Solax Power
Solax Power pocket Wifi+4gm
Solax Power pocket Wifi+lan
Solax Power pocket Wifi+lan 2.0
Solax Power pocket Wifi 4.0

Thu, 12 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
Description The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.
Title Missing Certificate Validation for Solax Power Pocket WiFi models MQTT Cloud Connection
Weaknesses CWE-295
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-02-12T14:48:08.160Z

Reserved: 2026-02-09T09:43:49.723Z

Link: CVE-2025-15573

cve-icon Vulnrichment

Updated: 2026-02-12T14:47:48.711Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-12T11:15:47.780

Modified: 2026-02-12T15:16:03.043

Link: CVE-2025-15573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-12T12:22:38Z

Weaknesses