TROYANOSYVIRUS
Back to CVEs

CVE-2025-15574

MEDIUM
6.5

Description

When connecting to the Solax Cloud MQTT server the username is the "registration number", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the "registration number" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.

CVE Details

CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/12/2026
Last Modified2/12/2026
Sourcenvd
Honeypot Sightings0

Weaknesses (CWE)

CWE-330

References

https://r.sec-consult.com/solax(551230f0-3615-47bd-b7cc-93e92e730bbf)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.