The firmware update functionality does not verify the authenticity of the supplied firmware update files. This allows attackers to flash malicious firmware update files on the device. Initial analysis of the firmware update functionality does not show any cryptographic checks (e.g. digital signature checks) on the supplied firmware update files. Furthermore, ESP32 security features such as secure boot are not used.
References
| Link | Resource |
|---|---|
| https://r.sec-consult.com/solax |
Configurations
No configuration.
History
12 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
12 Feb 2026, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-12 11:15
Updated : 2026-02-12 16:16
NVD link : CVE-2025-15575
Mitre link : CVE-2025-15575
CVE.ORG link : CVE-2025-15575
JSON object : View
Products Affected
No product.
CWE
CWE-494
Download of Code Without Integrity Check
