DJI Pays $30K Fine After Accidental Hack Exposes Security Flaws in Romo Robovacs
DJI will pay a $30,000 bug bounty to a researcher who accidentally hacked 7,000 Romo robovacs, highlighting critical security flaws in the Internet of Things ecosystem.
TechFeed24
In an unusual intersection of consumer electronics, security vulnerabilities, and accidental heroism, DJI, the drone giant, has agreed to pay a $30,000 bounty to a security researcher who inadvertently uncovered a massive security flaw affecting thousands of Romo robovacs. This incident serves as a stark reminder that even seemingly benign IoT devices can harbor significant security risks.
Key Takeaways
- A security researcher accidentally gained control over approximately 7,000 Romo robovacs due to a weak security implementation.
- DJI, which owns the Romo brand, is paying a $30,000 reward under its bug bounty program.
- The vulnerability stemmed from poor default authentication protocols on the devices' firmware.
- This case highlights the ongoing security challenge within the rapidly expanding Internet of Things (IoT) market.
What Happened
The researcher, who has chosen to remain anonymous, was reportedly testing network scanning tools when they stumbled upon a large fleet of Romo robovacs broadcasting management ports wide open. These aren't DJI's primary drone products, but rather the small, educational robotics kits sold under the Romo name, which are essentially smart vacuum-like robots.
Sources confirm the vulnerability allowed the researcher to issue commands to the devices, essentially taking remote control over thousands of units spread across various networks. This wasn't a malicious hack but a discovery made while performing routine security sweeps, illustrating how easily default settings can be exploited.
DJI responded swiftly by acknowledging the severity and rewarding the researcher through their established bug bounty program. This payout is one of the larger sums awarded for an IoT vulnerability this year, signaling the company's seriousness about patching the flaw.
Why This Matters
This isn't just about robot vacuums; it’s about IoT security hygiene. The fact that 7,000 devices could be centrally controlled points to a systemic failure in authentication, likely relying on hardcoded or easily guessable default credentials. This echoes historical issues seen with early smart cameras and routers, where manufacturers prioritized speed-to-market over robust security.
My editorial take is that this incident provides DJI with an invaluable, albeit expensive, lesson. Unlike drones, which operate in defined airspace, these ground-based robots interact directly with homes and educational environments. A compromised fleet could be used for unauthorized surveillance or denial-of-service attacks on local networks. The $30,000 payment is a small price compared to the potential reputational damage of a widespread robot takeover.
What's Next
We expect DJI to push an immediate over-the-air firmware update to all connected Romo units, forcing a password reset or implementing mandatory, complex authentication before allowing remote access. Furthermore, this will likely trigger an internal audit across all their non-drone product lines, ensuring that educational and consumer robotics adhere to stricter baseline security standards moving forward.
Broader industry implications suggest that regulatory bodies will pay closer attention to security standards for low-cost, high-volume IoT devices. If manufacturers won't implement basic security voluntarily, legislation mandating minimum standards—like unique default passwords—will become inevitable.
The Bottom Line
Accidental discovery or not, the Romo robovac incident is a cybersecurity wake-up call for the Internet of Things. DJI is handling the fallout responsibly by compensating the researcher, but the underlying lesson is clear: in the connected world, every device is a potential entry point, and security cannot be an afterthought.
Sources (1)
Last verified: Mar 7, 2026- 1[1] The Verge - DJI will pay $30K to the man who accidentally hacked 7,000 RVerifiedprimary source
This article was synthesized from 1 source. We verify facts against multiple sources to ensure accuracy. Learn about our editorial process →
This article was created with AI assistance. Learn more