AI-enabled hacks expose remote shutdown risk in microinverters

Share

Cybersecurity firm Jakkaru has disclosed a critical security vulnerability in microinverters manufactured by Chinese manufacturer AP Systems.

According to Jakkaru, the flaw allowed complete compromise of the devices over the internet, including the ability to selectively and simultaneously shut down systems. AP Systems patched the vulnerability after being alerted by Jakkaru.

The hack targeted the EZ1-M microinverter, which is also sold as a white-label product by companies such as Anker under the model name Solix Mi80. Jakkaru identified approximately 100,000 vulnerable devices that were accessible online. The researchers believe that a potentially larger device base, including AP Systems’ home energy storage systems, may also have been affected. Around 600,000 AP Systems installations are in use worldwide.

MQTT infrastructure attack

The researchers discovered a relatively easily hackable MQTT gateway within the inverters’ communication system. The devices transmit operating data via a cloud-based MQTT system, with authentication performed using static keys derived from the device’s serial number. Because these serial numbers are assigned sequentially, they are relatively easy to predict.

Jakkaru’s team reconstructed the authentication mechanism. In their tests, they used AI models such as Gemini Pro to reverse-engineer the firmware. This allowed them to impersonate a legitimate device on the MQTT gateway.

Jakkaru highlighted the ability to trigger firmware updates via “retained messages” in the MQTT protocol as particularly critical. Attackers can exploit this to flash malicious firmware onto the devices. In a proof-of-concept, the researchers demonstrated that this grants complete control over the inverter.

“AI systems like Gemini Pro can help find security vulnerabilities faster and more effectively,” said Marlon Starkloff, Managing Director of Jakkaru, in a chat with pv magazine. “Instead of several days of manual research, AI systems now take only a few hours. However, this also enables attackers with limited IT knowledge to cause significant damage. The barrier to entry has been lowered.”

Starkloff noted that experienced hackers likely could have discovered the vulnerability without AI, but Gemini simplified the process. Reverse engineering requires in-depth knowledge to identify certain functionalities, and AI systems are particularly well-suited for this. He estimates that compromising the AP Systems inverters would have taken about three days without AI—just one hour with AI assistance.

Entry point

In addition to the communication module, the inverters’ power electronics control components could also be targeted, potentially allowing attackers to interfere with power feed-in. According to Jakkaru, such a compromise could have several consequences, including access to Wi-Fi credentials and other information stored on the device, using compromised inverters as entry points into local networks, amassing devices for DDoS attacks, damaging devices through manipulated firmware, or even coordinating the shutdown of large numbers of inverters.

Jakkaru reported the vulnerability to AP Systems in November 2025. The manufacturer estimated it would take roughly three months to remediate, due to required adjustments to backend infrastructure. The results were published on March 4, 2026.

“AP Systems has completed a comprehensive update to its device-to-server communication security. Thanks to numerous technical improvements, all products now fully comply with European cybersecurity standards. To address gaps such as weak traditional encryption and unprotected secret keys, AP Systems devices now use a security authentication solution with unique credentials per device, effectively preventing malicious attacks and information leaks,” a spokesperson from AP Systems told pv magazine.

“Simultaneously, the system verifies unique identifiers, such as device type and MAC address, combined with the X-Sign signature verification mechanism, to ensure authentic and trustworthy requests and further enhance device access security,” the spokesperson went on to say. “This update marks a milestone in AP Systems’ cybersecurity capabilities, reinforcing the company’s leading position in product security and compliance. It enables AP Systems users in Europe and worldwide to benefit from more secure, stable, and reliable products and services.”

This content is protected by copyright and may not be reused. If you want to cooperate with us and would like to reuse some of our content, please contact: editors@pv-magazine.com.

Popular content

Indian startup launches plug-and-play hydrogen cooking unit
06 April 2026 Indian clean-tech startup Greenvize has launched a compact hydrogen-based cooking system designed for residential and commercial kitchens. The system...