PV column

Photovoltaic

2026/04/15

AI-enabled hacks expose remote shutdown risk in microinverters (PV Magazine)

Since the release of ChatGPT, AI has attracted considerable attention, and I believe that its use is advancing in all fields. Unfortunately, there are cases where AI is being misused, and cyberattacks using AI against databases and communication equipment are increasing. It appears that AI is also being misused to hijack equipment at solar PV facilities in Japan.

In this column, we would like to introduce the article “AI-enabled hacks expose remote shutdown risk in microinverters,” which was published on April 7, 2026, in PV Magazine, a world-renowned PV media in Germany.

Source: https://www.pv-magazine.com/2026/04/07/microinverters-hacked-with-ai-coordinated-remote-shutdown-possible/

**********

April 7, 2026 Marian Willuhn

AI-enabled hacks expose remote shutdown risk in microinverters

IT security firm Jakkaru has identified a vulnerability in microinverters from AP Systems that could enable a “kill switch” scenario, potentially shutting down tens of thousands of inverters simultaneously and disrupting grid operations.

Image: Julio Lopez, Unsplash

Cybersecurity firm Jakkaru has disclosed a critical security vulnerability in microinverters manufactured by Chinese manufacturer AP Systems.

According to Jakkaru, the flaw allowed complete compromise of the devices over the internet, including the ability to selectively and simultaneously shut down systems. AP Systems patched the vulnerability after being alerted by Jakkaru.

The hack targeted the EZ1-M microinverter, which is also sold as a white-label product by companies such as Anker under the model name Solix Mi80. Jakkaru identified approximately 100,000 vulnerable devices that were accessible online. The researchers believe that a potentially larger device base, including AP Systems’ home energy storage systems, may also have been affected. Around 600,000 AP Systems installations are in use worldwide.

MQTT infrastructure attack

The researchers discovered a relatively easily hackable MQTT gateway within the inverters’ communication system. The devices transmit operating data via a cloud-based MQTT system, with authentication performed using static keys derived from the device’s serial number. Because these serial numbers are assigned sequentially, they are relatively easy to predict.

Jakkaru’s team reconstructed the authentication mechanism. In their tests, they used AI models such as Gemini Pro to reverse-engineer the firmware. This allowed them to impersonate a legitimate device on the MQTT gateway.

Jakkaru highlighted the ability to trigger firmware updates via “retained messages” in the MQTT protocol as particularly critical. Attackers can exploit this to flash malicious firmware onto the devices. In a proof-of-concept, the researchers demonstrated that this grants complete control over the inverter.

“AI systems like Gemini Pro can help find security vulnerabilities faster and more effectively,” said Marlon Starkloff, Managing Director of Jakkaru, in a chat with pv magazine. “Instead of several days of manual research, AI systems now take only a few hours. However, this also enables attackers with limited IT knowledge to cause significant damage. The barrier to entry has been lowered.”

Starkloff noted that experienced hackers likely could have discovered the vulnerability without AI, but Gemini simplified the process. Reverse engineering requires in-depth knowledge to identify certain functionalities, and AI systems are particularly well-suited for this. He estimates that compromising the AP Systems inverters would have taken about three days without AI—just one hour with AI assistance.

Entry point

In addition to the communication module, the inverters’ power electronics control components could also be targeted, potentially allowing attackers to interfere with power feed-in. According to Jakkaru, such a compromise could have several consequences, including access to Wi-Fi credentials and other information stored on the device, using compromised inverters as entry points into local networks, amassing devices for DDoS attacks, damaging devices through manipulated firmware, or even coordinating the shutdown of large numbers of inverters.

Jakkaru reported the vulnerability to AP Systems in November 2025. The manufacturer estimated it would take roughly three months to remediate, due to required adjustments to backend infrastructure. The results were published on March 4, 2026.

“AP Systems has completed a comprehensive update to its device-to-server communication security. Thanks to numerous technical improvements, all products now fully comply with European cybersecurity standards. To address gaps such as weak traditional encryption and unprotected secret keys, AP Systems devices now use a security authentication solution with unique credentials per device, effectively preventing malicious attacks and information leaks,” a spokesperson from AP Systems told pv magazine.

“Simultaneously, the system verifies unique identifiers, such as device type and MAC address, combined with the X-Sign signature verification mechanism, to ensure authentic and trustworthy requests and further enhance device access security,” the spokesperson went on to say. “This update marks a milestone in AP Systems’ cybersecurity capabilities, reinforcing the company’s leading position in product security and compliance. It enables AP Systems users in Europe and worldwide to benefit from more secure, stable, and reliable products and services.”

**********

The case of AP Systems, a Chinese company, that received a warning from the cybersecurity firm Jakkaru, as featured in the article, and responded quickly, is in a sense a success story and I think it will become a standard practice for manufacturers going forward.

In Japan, the Information-technology Promotion Agency, Japan (IPA) has established certification and regulation for information security, such as the “Japan Information Technology Security Evaluation and Certification Scheme (JISEC)” and the “Labeling Scheme based on Japan Cyber-Security Technical Assessment Requirements (JC-STAR),” which the solar PV industry is also increasingly adopting.

Solar PV facilities are critical infrastructures, so we believe it is important to utilize AI while also protecting it from AI-driven threats.

Acknowledgments: We extend our sincere thanks to the author Mr. Marian Willuhn at PV Magazine, for granting permission to reproduce this valuable article.

We would be happy to receive your request.
Click here for consultation or request for quotation.