Home

Description

The firmware update functionality does not verify the authenticity of the supplied firmware update files. This allows attackers to flash malicious firmware update files on the device. Initial analysis of the firmware update functionality does not show any cryptographic checks (e.g. digital signature checks) on the supplied firmware update files. Furthermore, ESP32 security features such as secure boot are not used.

PUBLISHED Reserved 2026-02-09 | Published 2026-02-12 | Updated 2026-02-12 | Assigner SEC-VLab

Problem types

CWE-494 Download of Code Without Integrity Check

Product status

Default status
unaffected

<3.022.03
affected

Default status
unaffected

<1.009.02
affected

Default status
unaffected

<1.005.05
affected

Default status
unaffected

<006.06
affected

Default status
unaffected

<003.03
affected

Credits

Stefan Viehböck, SEC Consult Vulnerability Lab finder

References

r.sec-consult.com/solax

cve.org (CVE-2025-15575)

nvd.nist.gov (CVE-2025-15575)

Download JSON