CVE-2023-35837
📋 TL;DR
SolaX Pocket WiFi 3 devices have a critical authentication vulnerability where the web interface uses a default password equal to the device's registration ID, which is also the WiFi SSID name. Attackers can access the web interface without authentication, reconfigure devices, or upload malicious firmware, leading to complete device compromise. All users of SolaX Pocket WiFi 3 devices with default configurations are affected.
💻 Affected Systems
- SolaX Pocket WiFi 3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing firmware replacement, persistent backdoor installation, denial of service, and potential lateral movement to connected systems.
Likely Case
Unauthorized access to device configuration, firmware modification, and potential disruption of solar monitoring/control functions.
If Mitigated
Limited to network reconnaissance if proper authentication controls are implemented.
🎯 Exploit Status
Exploitation requires only the WiFi SSID (registration ID) as password. No technical skills needed beyond basic web access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.solaxpower.com/downloads/
Restart Required: No
Instructions:
1. Check vendor website for firmware updates 2. Download latest firmware 3. Upload via web interface 4. Change default password immediately after update
🔧 Temporary Workarounds
Change Default Password
allImmediately change the default administrative password to a strong, unique password
Access web interface at device IP > Settings > Change Password
Network Segmentation
allIsolate SolaX devices on separate VLAN with restricted access
🧯 If You Can't Patch
- Disable remote web interface access if not required
- Implement network firewall rules to restrict access to device management interface
🔍 How to Verify
Check if Vulnerable:
1. Connect to SolaX Pocket WiFi network 2. Note SSID name 3. Access web interface at device IP 4. Try logging in with SSID as password
Check Version:
Check firmware version in web interface under System Information
Verify Fix Applied:
1. Attempt to login with old default password (should fail) 2. Verify new strong password is required
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login
- Firmware upload events
- Configuration changes from unknown IPs
Network Indicators:
- HTTP requests to device management interface from unexpected sources
- Unusual outbound connections from device
SIEM Query:
source_ip=* AND (url_path="/login" OR url_path="/upload") AND user_agent NOT IN ["expected_user_agents"]
🔗 References
- https://www.solaxpower.com/downloads/
- https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/
- https://yougottahackthat.com/blog/
- https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication
- https://www.solaxpower.com/downloads/
- https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/
- https://yougottahackthat.com/blog/
- https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication