Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14346: CWE-306 Missing Authentication for Critical Function in WHILL Model C2 Electric Wheelchair

0
Critical
VulnerabilityCVE-2025-14346cvecve-2025-14346cwe-306
Published: Mon Jan 05 2026 (01/05/2026, 15:39:19 UTC)
Source: CVE Database V5
Vendor/Project: WHILL
Product: Model C2 Electric Wheelchair

Description

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction.

AI-Powered Analysis

AILast updated: 01/05/2026, 16:07:58 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14346 affects the WHILL Model C2 Electric Wheelchair and Model F Power Chairs by lacking any authentication mechanism for Bluetooth connections. This flaw is categorized under CWE-306 (Missing Authentication for Critical Function), meaning critical functions can be accessed without verifying the identity of the connecting party. Since Bluetooth pairing is unrestricted, an attacker within wireless range can connect to the wheelchair and issue arbitrary commands. These commands include controlling movement directions, overriding speed restrictions designed for safety, and modifying configuration profiles that may affect device behavior. The vulnerability impacts all versions of the affected models, indicating a systemic design flaw rather than a patchable bug in specific releases. The CVSS v3.1 base score of 9.8 reflects the ease of exploitation (no privileges or user interaction required), network attack vector, and the severe consequences on confidentiality, integrity, and availability. The attacker can fully control the wheelchair, potentially causing physical harm to the user or others. No patches or firmware updates are currently available, and no exploits have been observed in the wild yet. The vulnerability was reserved in December 2025 and published in January 2026 by ICS-CERT, highlighting its relevance to industrial control and safety-critical devices. This issue underscores the risks of insufficient security design in assistive medical devices that rely on wireless communication.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for healthcare providers, rehabilitation centers, assisted living facilities, and any institutions deploying WHILL Model C2 or Model F wheelchairs. Unauthorized control over wheelchairs can lead to physical injury to users or bystanders, liability issues, and loss of trust in assistive technologies. The confidentiality of user data may also be compromised if configuration profiles contain personal information. The integrity and availability of the wheelchair’s functions are directly threatened, potentially rendering the device unsafe or unusable. This could disrupt patient care and increase operational costs due to device recalls or replacements. Additionally, the reputational damage to healthcare providers and manufacturers could be severe. Given the critical nature of the vulnerability and the lack of authentication, attackers with minimal technical skill could exploit this threat if in proximity, making it a high-risk scenario in densely populated or clinical environments.

Mitigation Recommendations

Immediate mitigation requires WHILL to develop and distribute firmware updates that enforce strong authentication for Bluetooth connections, ideally using secure pairing methods such as passkey entry or out-of-band authentication. Until patches are available, organizations should implement strict physical security controls to limit attacker proximity, such as restricting wheelchair use to controlled environments and disabling Bluetooth when not in use if possible. Employing Bluetooth signal jamming or shielding in sensitive areas may reduce attack surface. Training staff and users to recognize unusual wheelchair behavior and report incidents promptly is critical. Network segmentation and monitoring of Bluetooth traffic can help detect unauthorized pairing attempts. Procurement policies should prioritize devices with robust security features. Collaboration with WHILL for timely updates and vulnerability disclosure is essential. Finally, conducting risk assessments for all assistive devices using wireless communication will help identify and mitigate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-12-09T14:54:28.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bde83b7d620313938fa7a

Added to database: 1/5/2026, 3:53:39 PM

Last enriched: 1/5/2026, 4:07:58 PM

Last updated: 1/7/2026, 10:10:43 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats