DJI RoboVacs Hacked, Exposing Thousands of Homes

A major security flaw in DJI RoboVacs allowed a user to accidentally control thousands of devices, accessing cameras and home maps. DJI has since patched the vulnerabilities.

6 days ago
4 min read

DJI RoboVacs Hacked, Exposing Thousands of Homes

In a startling revelation that blurs the line between smart home convenience and potential security nightmare, a recent discovery has shown that thousands of DJI RoboVacs were inadvertently accessible due to a significant security flaw. What began as a user’s attempt to control their own smart vacuum cleaner quickly escalated into the discovery of a backdoor that granted access to approximately 7,000 DJI devices, and potentially up to 10,000 more across related products.

The incident came to light when Sammy Azdufall, an individual working in AI, was experimenting with controlling his DJI RoboVac. Using AI tools like Claude, he reportedly discovered that by asking the AI to help control his vacuum, it not only provided instructions but also identified a vast network of accessible devices. This wasn’t a sophisticated, targeted hack; rather, it was a vulnerability so wide open that a curious user with basic AI knowledge could stumble upon it.

A Simple Request, A Terrifying Outcome

The extent of the vulnerability became clear when Azdufall was able to gain control of not just his own vacuum, but thousands of others. To test the severity, he was even given the identifier for a review unit of the DJI RoboVac being used by a journalist. Through this unit, Azdufall reportedly gained full control, including the ability to drive the vacuum around the reviewer’s home, view its camera feed, and access the complete map of the house—all through a PlayStation controller. This level of access highlights a profound lack of security in the device’s network infrastructure.

Beyond Vacuums: A Wider Threat?

The scope of the breach didn’t stop at just the RoboVacs. It was also revealed that another, even more severe, security flaw existed within DJI’s systems. This second vulnerability was reportedly so concerning that the journalist who uncovered the story felt uncomfortable disclosing its full details. This suggests a systemic issue within DJI’s smart device security protocols. DJI has since stated that both vulnerabilities have been addressed and patched, but the initial exposure raises serious questions about the company’s commitment to user privacy and data security.

Who Should Be Concerned?

This incident should be a wake-up call for anyone using smart home devices, particularly those from DJI. While the immediate threat may have been mitigated by software patches, the ease with which such a breach occurred is alarming. Consumers who own or are considering purchasing DJI RoboVacs or other connected devices from the company should be aware of the potential risks. The ability for an unauthorized individual to remotely control a device equipped with cameras and mapping capabilities within one’s home is a privacy invasion of the highest order.

The situation also underscores the evolving landscape of cybersecurity threats. As AI tools become more accessible and powerful, the potential for accidental or intentional misuse grows. Azdufall’s discovery, while seemingly accidental, demonstrates how quickly a user with the right knowledge can uncover vulnerabilities that could have far-reaching consequences. This isn’t the stuff of Hollywood thrillers; it’s the reality of interconnected devices and the sometimes-fragile security that protects them.

DJI’s Response and Future Implications

DJI’s swift acknowledgment and patching of the vulnerabilities are positive steps. However, the incident leaves a lingering question mark over the security architecture of their smart products. In an era where consumers are increasingly reliant on connected devices for convenience, trust in the security of these products is paramount. For DJI, rebuilding that trust will involve not only robust security measures but also transparent communication about their security practices and incident response.

The implications extend beyond DJI. This event serves as a stark reminder to all smart device manufacturers to prioritize security from the ground up. The potential for compromised devices to be used for surveillance, disruption, or even as entry points into broader home networks is a significant concern. As more devices become ‘smart,’ the responsibility to ensure they are also ‘secure’ becomes increasingly critical.

Specs & Key Features (DJI RoboVac – Model Unspecified in Transcript)

  • Remote control via app
  • Camera feed access
  • Home mapping capabilities
  • PlayStation controller compatibility (via exploit)
  • AI-assisted operation

Availability and Pricing

Specific pricing and availability details for the DJI RoboVac model involved in the security incident were not disclosed in the original transcript. However, DJI typically offers a range of robotic vacuum cleaners with varying features and price points, generally competing in the mid-to-high range of the smart home appliance market.


Source: Man accidentally hacks into 7,000 DJI robovacs. #Vergecast (YouTube)

Leave a Comment