CVE-2025-14346: CWE-306 Missing Authentication for Critical Function in WHILL Model C2 Electric Wheelchair
CVE-2025-14346 is a critical vulnerability affecting WHILL Model C2 Electric Wheelchairs and Model F Power Chairs, where Bluetooth connections lack authentication. An attacker within Bluetooth range can pair with the device without credentials or user interaction, allowing full control over movement commands, speed settings, and configuration profiles. This vulnerability poses severe risks to user safety and privacy. The CVSS score is 9. 8, reflecting high impact on confidentiality, integrity, and availability. No patches are currently available, and no exploits have been observed in the wild yet. European organizations involved in healthcare, rehabilitation centers, and mobility services using these devices are at risk. Mitigation requires disabling Bluetooth when not in use, physical security controls, and close coordination with the vendor for firmware updates. Countries with higher adoption of assistive mobility devices and strong healthcare infrastructure, such as Germany, France, the UK, and the Netherlands, are likely most affected. Immediate attention is critical to prevent potential harm to vulnerable users.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14346 affects all versions of the WHILL Model C2 Electric Wheelchair and Model F Power Chairs. The core issue is the absence of authentication enforcement for Bluetooth connections, categorized under CWE-306 (Missing Authentication for Critical Function). This means that any attacker within Bluetooth range can pair with the wheelchair without needing credentials or user interaction. Once paired, the attacker can issue arbitrary movement commands, override speed restrictions, and manipulate configuration profiles. This lack of authentication severely compromises the integrity and availability of the device's control functions and threatens user safety. The CVSS 3.1 score of 9.8 indicates a critical severity with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. The vulnerability was reserved in December 2025 and published in January 2026. No patches or firmware updates have been released yet, and no known exploits are reported in the wild. The vulnerability is particularly dangerous because it targets medical assistive devices used by vulnerable populations, potentially leading to physical harm or loss of mobility. The Bluetooth protocol's inherent short-range nature limits the attack surface but does not eliminate risk in crowded or public environments. The lack of authentication is a fundamental design flaw that requires urgent remediation by the vendor.
Potential Impact
For European organizations, especially healthcare providers, rehabilitation centers, and assisted living facilities using WHILL electric wheelchairs, this vulnerability poses a significant safety risk. Attackers could remotely control wheelchairs, causing physical harm to users or disrupting mobility services. The confidentiality of user data stored or transmitted via the device could also be compromised. The integrity of device settings can be manipulated, potentially disabling safety features like speed limits. Availability is at risk as attackers could render devices unusable or cause erratic behavior. This could lead to liability issues, reputational damage, and regulatory scrutiny under EU medical device and data protection regulations (e.g., MDR, GDPR). The vulnerability also raises concerns about the security of IoT and medical devices in Europe, emphasizing the need for stricter security standards. The lack of patches means organizations must rely on interim mitigations, increasing operational complexity. The threat is heightened in densely populated urban areas and healthcare institutions with many such devices in use.
Mitigation Recommendations
Immediate mitigation steps include disabling Bluetooth connectivity on the affected wheelchairs when not in use to reduce the attack surface. Physical security controls should be enhanced to prevent unauthorized proximity to devices, such as secure storage when not in use. Organizations should implement strict access controls and monitoring around wheelchair usage areas. Vendor engagement is critical; organizations must demand prompt firmware updates or patches that enforce proper authentication for Bluetooth connections. Until patches are available, consider deploying Bluetooth signal jamming or shielding solutions in sensitive environments, where legally permissible. Training staff and users to recognize suspicious device behavior and report anomalies is essential. Incident response plans should be updated to include scenarios involving compromised mobility devices. Procurement policies should be reviewed to prioritize devices with robust security features. Finally, collaboration with regulatory bodies to expedite vulnerability disclosure and remediation is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden
CVE-2025-14346: CWE-306 Missing Authentication for Critical Function in WHILL Model C2 Electric Wheelchair
Description
CVE-2025-14346 is a critical vulnerability affecting WHILL Model C2 Electric Wheelchairs and Model F Power Chairs, where Bluetooth connections lack authentication. An attacker within Bluetooth range can pair with the device without credentials or user interaction, allowing full control over movement commands, speed settings, and configuration profiles. This vulnerability poses severe risks to user safety and privacy. The CVSS score is 9. 8, reflecting high impact on confidentiality, integrity, and availability. No patches are currently available, and no exploits have been observed in the wild yet. European organizations involved in healthcare, rehabilitation centers, and mobility services using these devices are at risk. Mitigation requires disabling Bluetooth when not in use, physical security controls, and close coordination with the vendor for firmware updates. Countries with higher adoption of assistive mobility devices and strong healthcare infrastructure, such as Germany, France, the UK, and the Netherlands, are likely most affected. Immediate attention is critical to prevent potential harm to vulnerable users.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-14346 affects all versions of the WHILL Model C2 Electric Wheelchair and Model F Power Chairs. The core issue is the absence of authentication enforcement for Bluetooth connections, categorized under CWE-306 (Missing Authentication for Critical Function). This means that any attacker within Bluetooth range can pair with the wheelchair without needing credentials or user interaction. Once paired, the attacker can issue arbitrary movement commands, override speed restrictions, and manipulate configuration profiles. This lack of authentication severely compromises the integrity and availability of the device's control functions and threatens user safety. The CVSS 3.1 score of 9.8 indicates a critical severity with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. The vulnerability was reserved in December 2025 and published in January 2026. No patches or firmware updates have been released yet, and no known exploits are reported in the wild. The vulnerability is particularly dangerous because it targets medical assistive devices used by vulnerable populations, potentially leading to physical harm or loss of mobility. The Bluetooth protocol's inherent short-range nature limits the attack surface but does not eliminate risk in crowded or public environments. The lack of authentication is a fundamental design flaw that requires urgent remediation by the vendor.
Potential Impact
For European organizations, especially healthcare providers, rehabilitation centers, and assisted living facilities using WHILL electric wheelchairs, this vulnerability poses a significant safety risk. Attackers could remotely control wheelchairs, causing physical harm to users or disrupting mobility services. The confidentiality of user data stored or transmitted via the device could also be compromised. The integrity of device settings can be manipulated, potentially disabling safety features like speed limits. Availability is at risk as attackers could render devices unusable or cause erratic behavior. This could lead to liability issues, reputational damage, and regulatory scrutiny under EU medical device and data protection regulations (e.g., MDR, GDPR). The vulnerability also raises concerns about the security of IoT and medical devices in Europe, emphasizing the need for stricter security standards. The lack of patches means organizations must rely on interim mitigations, increasing operational complexity. The threat is heightened in densely populated urban areas and healthcare institutions with many such devices in use.
Mitigation Recommendations
Immediate mitigation steps include disabling Bluetooth connectivity on the affected wheelchairs when not in use to reduce the attack surface. Physical security controls should be enhanced to prevent unauthorized proximity to devices, such as secure storage when not in use. Organizations should implement strict access controls and monitoring around wheelchair usage areas. Vendor engagement is critical; organizations must demand prompt firmware updates or patches that enforce proper authentication for Bluetooth connections. Until patches are available, consider deploying Bluetooth signal jamming or shielding solutions in sensitive environments, where legally permissible. Training staff and users to recognize suspicious device behavior and report anomalies is essential. Incident response plans should be updated to include scenarios involving compromised mobility devices. Procurement policies should be reviewed to prioritize devices with robust security features. Finally, collaboration with regulatory bodies to expedite vulnerability disclosure and remediation is recommended.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-12-09T14:54:28.374Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bde83b7d620313938fa7a
Added to database: 1/5/2026, 3:53:39 PM
Last enriched: 1/12/2026, 9:39:18 PM
Last updated: 2/7/2026, 12:15:54 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.