CVE-2025-15573 - Vulnerability Analysis
CriticalCVSS: 9.4Last Updated: February 12, 2026
SolaX - Man-in-the-Middle
Overview
SolaX devices contain a man-in-the-middle vulnerability caused by lack of server certificate validation when connecting to the SolaX Cloud MQTTS server, letting attackers issue arbitrary commands, exploit requires network position to intercept traffic.
Severity & Score
Impact
Attackers can intercept and manipulate device commands, potentially controlling devices remotely and causing unauthorized actions.
Mitigation
Update to a version that validates server certificates or apply patches to enforce certificate validation.
References
Social Media Activity(1 post)
š“ CVE-2025-15573 - Critical (9.4) The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitim... š https://www.thehackerwire.com/vulnerability/CVE-2025-15573/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-15573
- Severity
- Critical
- CVSS Score
- 9.4
- Type
- man_in_the_middle
- Status
- unconfirmed
- EPSS
- 2.0%
- Social Posts
- 1
CWE
- CWE-295
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L