Project Subscriptions
No advisories yet.
Solution
The vendor provides patches for the affected Pocket models which can be obtained throw their customer's Solax Cloud account and using the Pocket firmware upgrade function there. As of February 10, 2026, the firmware versions for each affected Pocket model are as follows according to the vendor: 1. Pocket WiFi 3.0 – (3.022.03) 2. Pocket WiFi+LAN – (1.009.02) 3. Pocket WiFi+4GM – (1.005.05) 4. Pocket WiFi+LAN 2.0 – (006.06) 5. Pocket WiFi 4.0 – (003.03) The vendor provided the following further information regarding EV Charger and Adapter Box: 1. EV Charger: The WiFi module firmware supports digital signature, but only one-way authentication is implemented. 2. Adapter Box: The WiFi module firmware supports two-way authentication and digital signature.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://r.sec-consult.com/solax |
|
Thu, 12 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solax
Solax pocket Wifi 3 Solax Power Solax Power pocket Wifi+4gm Solax Power pocket Wifi+lan Solax Power pocket Wifi+lan 2.0 Solax Power pocket Wifi 4.0 |
|
| Vendors & Products |
Solax
Solax pocket Wifi 3 Solax Power Solax Power pocket Wifi+4gm Solax Power pocket Wifi+lan Solax Power pocket Wifi+lan 2.0 Solax Power pocket Wifi 4.0 |
Thu, 12 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices. | |
| Title | Missing Certificate Validation for Solax Power Pocket WiFi models MQTT Cloud Connection | |
| Weaknesses | CWE-295 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-02-12T14:48:08.160Z
Reserved: 2026-02-09T09:43:49.723Z
Link: CVE-2025-15573
Updated: 2026-02-12T14:47:48.711Z
Status : Awaiting Analysis
Published: 2026-02-12T11:15:47.780
Modified: 2026-02-12T15:16:03.043
Link: CVE-2025-15573
No data.
OpenCVE Enrichment
Updated: 2026-02-12T12:22:38Z