Exploit for CVE-2025-15573

The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.

Published: 2026-02-12

CVSS: 9.4

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Download Exploit for CVE-2025-15573 here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

Check our portfolio:

https://veletacapital.com/exploit-67-cve-2026-25150/

https://veletacapital.com/exploit-61-cve-2020-37082/

https://veletacapital.com/exploit-661-cve-2026-27727/

https://veletacapital.com/exploit-493-cve-2026-2886/

https://veletacapital.com/exploit-43-cve-2026-25236/