MQTT Server Vulnerability in SolaX Power Devices
CVE-2025-15574
What is CVE-2025-15574?
A vulnerability exists in SolaX Power devices that enables attackers to exploit the MQTT server by using the 'registration number' as the username. This 10-character identifier, visible on the SolaX Power Pocket device, allows unauthorized users to gain access by leveraging a flawed password generation process that utilizes a proprietary XOR/transposition algorithm. As a result, individuals familiar with these registration numbers can impersonate legitimate devices, posing significant risks to the integrity and security of connected IoT systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Pocket WiFi 3.0 <3.022.03
Pocket WiFi 4.0 <003.03
Pocket WiFi+4GM <1.005.05
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
