MQTT Server Vulnerability in SolaX Power Devices
CVE-2025-15574

6.5MEDIUM

Key Information:

Vendor
CVE Published:
12 February 2026

What is CVE-2025-15574?

A vulnerability exists in SolaX Power devices that enables attackers to exploit the MQTT server by using the 'registration number' as the username. This 10-character identifier, visible on the SolaX Power Pocket device, allows unauthorized users to gain access by leveraging a flawed password generation process that utilizes a proprietary XOR/transposition algorithm. As a result, individuals familiar with these registration numbers can impersonate legitimate devices, posing significant risks to the integrity and security of connected IoT systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Pocket WiFi 3.0 <3.022.03

Pocket WiFi 4.0 <003.03

Pocket WiFi+4GM <1.005.05

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Stefan Viehböck, SEC Consult Vulnerability Lab
.