When connecting to the Solax Cloud MQTT server the username is the "registration number", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the "registration number" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.
References
History

Thu, 12 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Solax
Solax pocket Wifi 3
Solax Power
Solax Power pocket Wifi+4gm
Solax Power pocket Wifi+lan
Solax Power pocket Wifi+lan 2.0
Solax Power pocket Wifi 4.0
Vendors & Products Solax
Solax pocket Wifi 3
Solax Power
Solax Power pocket Wifi+4gm
Solax Power pocket Wifi+lan
Solax Power pocket Wifi+lan 2.0
Solax Power pocket Wifi 4.0

Thu, 12 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Description When connecting to the Solax Cloud MQTT server the username is the "registration number", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the "registration number" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.
Title Insecure Credential Generation for Solax Power Pocket WiFi models MQTT Cloud Connection
Weaknesses CWE-330
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2026-02-12T10:58:29.373Z

Updated: 2026-02-12T15:15:45.817Z

Reserved: 2026-02-09T09:43:51.017Z

Link: CVE-2025-15574

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-12T11:15:49.117

Modified: 2026-02-12T15:10:37.307

Link: CVE-2025-15574

cve-icon Redhat

No data.