男子意外控制了7000台扫地机器人。
Man accidentally gains control of 7k robot vacuums

原始链接: https://www.popsci.com/technology/robot-vacuum-army/

软件工程师山米·阿兹杜法尔(Sammy Azdoufal)在尝试用游戏手柄控制 DJI Romo 扫地机器人时,发现了一个重大的安全漏洞。他利用 AI 编码助手逆向工程该设备与 DJI 服务器的通信,意外获得了来自 24 个国家近 7000 台其他 Romo 扫地机器人的实时画面、地图和数据。 该漏洞允许阿兹杜法尔可能访问敏感数据,甚至远程控制这些设备,引发了对隐私和潜在监控的担忧。他负责任地将问题报告给 DJI 和 *The Verge*,促使该公司发布了修复补丁。 这起事件凸显了与互联网连接的智能家居设备相关的日益增长的安全风险,尤其是在 AI 工具降低了发现和利用漏洞的门槛。随着家庭采用更复杂的机器人,人们对数据隐私的担忧也在增加,关于 Ring 和 Google 等公司的数据隐私的争论仍在继续。DJI 称该问题已解决,并计划进一步加强安全措施。

一名黑客在Hacker News上报告,一名男子因共享密码漏洞意外控制了7000台扫地机器人。该事件引发了对重大安全漏洞以及相关公司可能面临罚款的讨论。 用户对扫地机器人能够访问实时摄像头画面和麦克风音频表示难以置信,并质疑这些功能的必要性。 一位评论员认为语音控制可能是原因之一。 该事件被幽默地描述为该男子成为一个“神”,可以控制一个机器人军队,尽管规模有限。 这篇文章强调了物联网设备安全方面存在的问题,以及由于共享凭据等疏忽可能导致的大范围访问。
相关文章

原文

A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes. 

While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

robot vaccum
The DJI Romo. Image: DJI

Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers.

As more households adopt home robots, (including newer, more interactive humanoid models) similar vulnerabilities could become harder to detect. AI-powered coding tools, which make it easier for people with less technical knowledge to exploit software flaws, potentially risk amplifying those worries even further. 

Stumbling into a massive security hole 

The robot in question is the DJI Romo, an autonomous home vacuum that first launched in China last year and is currently expanding to other countries. It retails for around $2,000 and is roughly the size of a large terrier or a small fridge when docked at its base station. Like other robot vacuums, it’s equipped with a range of sensors that help it navigate its surroundings and detect obstacles. Users can schedule and control it via an app, but it is designed to spend most of its time cleaning and mopping autonomously.

In order for the Romo, or really any modern autonomous vacuum, to function it needs to constantly collect visual data from the building it is operating in. It also needs to understand specific details about what makes, say, a kitchen different from a bedroom, so it can distinguish between the two. Some of that sensor data is stored remotely on DJI’s servers rather than on the device itself. For Azdoufal’s DIY controller idea to work, he would need a way for his app to communicate with DJI’s servers and extract a security token that proves he is the owner of the robot.

Rather than just verifying a single token, the servers granted access for a small army of robots, essentially treating him as their respective owner. That slip-up meant Azdoufal could tap into their real-time camera feeds and activate their microphones. He also claims he could compile 2D floor plans of the homes the robots were operating in. A quick look at the robots’ IP addresses also revealed their approximate locations. None of this, Azdoufal insists, amounts to “hacking” on his part. He simply stumbled upon a major security issue.

“DJI identified a vulnerability affecting DJI Home through internal review in late January and initiated remediation immediately,” DJI told Popular Science. “The issue was addressed through two updates, with an initial patch deployed on February 8 and a follow-up update completed on February 10. The fix was deployed automatically, and no user action is required.”

The company went on to say its plans to “continue to implement additional security enhancements” but did not specify what those may entail. 

Related: [The best robot vacuums]

Home owners are grappling with the privacy cost of smart homes 

The DJI security concerns come amid a period of growing unease generally about the surveillance capabilities of smart home technology. Earlier this month, Ring camera owners flooded social media after a controversial advertisement for the company’s pet-finding “search party” feature was interpreted by some as a Trojan horse for broader monitoring. Around the same time, reports that Google was able to retrieve video footage from a Nest Doorbell camera to assist in an abduction investigation (despite earlier indications that the footage had been deleted) reignited debate over how much control consumers truly have over their sensitive data. 

On top of that, lawmakers from both political parties in the US have spent years warning that DJI and other Chinese tech manufacturers pose a unique security threat. The evidence for those claims are murky, it’s nonetheless helped justify the banning of certain Chinese-made products

The irony of many robot vacuums and other smart home devices is that, as a category, they have a long history of questionable security practices, despite the fact that they operate in some of our most private spaces. All signs suggest that the average person will soon welcome more cameras and microphones into their homes, not fewer. As of 2020, market research firm Parks Associates estimates that 54 million U.S. households had at least one smart home device installed. Other surveys show that those who already have one often want more.

The specific types of devices entering homes are also becoming more sophisticated. Though still early, Tesla, Figure, and other companies are racing to build human-like autonomous robots that can live in a home and perform chores. A company called 1X is already retailing one of these humanoids, claiming it can clean dishes and crack walnuts—albeit often with some help from a human. Eventually though, for any of these at-home robot servants to function effectively, they will need unprecedented access to the intimate details of their owners’ homes. For a stalker or hacker, that represents a potential goldmine.

True to his word though, Azdoufal found himself wrapped up in this mess even though all he wanted to do was drive his robot around with a joystick. On that front, mission accomplished.

Controlling DJI Romo vacuum with a ps5 controller

 

2025 PopSci Best of What’s New

 

Mack DeGeurin is a tech reporter who’s spent years investigating where technology and politics collide. His work has previously appeared in Gizmodo, Insider, New York Magazine, and Vice.


联系我们 contact @ memedata.com