Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26673: n/a

0
High
VulnerabilityCVE-2026-26673cvecve-2026-26673
Published: Wed Mar 04 2026 (03/04/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2026-26673 is a vulnerability affecting several DJI drone models including Mavic Mini, Spark, Mavic Air, Mini, and Mini SE with firmware version 0. 1. 00. 0500 and below. The flaw resides in the DJI Enhanced-WiFi transmission subsystem and allows a remote attacker to cause a denial of service (DoS) condition. Exploitation does not require authentication or user interaction, making it potentially easy to trigger. While no known exploits are currently reported in the wild, the vulnerability could disrupt drone operations by interrupting communication. This could impact drone reliability and safety, especially in critical use cases such as surveying, delivery, or emergency response. No patches or fixes have been publicly disclosed yet. Organizations using affected DJI drones should monitor for updates and consider operational mitigations to reduce exposure.

AI-Powered Analysis

AILast updated: 03/04/2026, 16:17:42 UTC

Technical Analysis

CVE-2026-26673 is a denial of service vulnerability identified in the DJI Enhanced-WiFi transmission subsystem affecting multiple DJI drone models including Mavic Mini, Spark, Mavic Air, Mini, and Mini SE running firmware version 0.1.00.0500 and earlier. The vulnerability allows a remote attacker to disrupt the Wi-Fi communication channel used by these drones, effectively causing a denial of service. The flaw likely stems from improper handling of Wi-Fi packets or malformed frames within the enhanced Wi-Fi stack, leading to a crash or hang of the communication subsystem. Since the attack vector is remote and does not require authentication or user interaction, an attacker within Wi-Fi range could exploit this by sending crafted Wi-Fi frames to the drone, interrupting its control or telemetry link. This disruption could cause the drone to lose connectivity with its controller, potentially resulting in loss of control, mission failure, or forced landing. No CVSS score has been assigned yet, and no public patches or mitigations have been released. The vulnerability affects a broad range of popular consumer and prosumer DJI drones, which are widely used globally for photography, surveying, agriculture, and other commercial applications. The lack of authentication requirement and the critical nature of communication links in drone operation elevate the risk. Although no active exploitation has been reported, the vulnerability represents a significant threat to drone reliability and safety.

Potential Impact

The primary impact of CVE-2026-26673 is denial of service against affected DJI drones, which can interrupt or disable drone operations by severing the Wi-Fi communication link between the drone and its controller. This can lead to loss of control, mission failure, or forced emergency landing, potentially causing physical damage or safety hazards. For organizations relying on these drones for critical tasks such as infrastructure inspection, agriculture monitoring, emergency response, or delivery services, this could result in operational disruption, financial loss, and safety risks. The ease of exploitation without authentication means attackers in proximity can cause widespread disruption in areas with dense drone usage. Additionally, the inability to communicate with the drone could hinder situational awareness and data collection. Although no known exploits are currently active, the vulnerability could be leveraged in targeted attacks or by malicious actors seeking to disrupt drone operations in sensitive environments. The impact extends to both commercial and recreational users, affecting trust and reliability in DJI drone platforms.

Mitigation Recommendations

1. Monitor DJI official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 2. Limit Wi-Fi exposure by operating drones in controlled environments with restricted Wi-Fi access and avoid flying in areas with unknown or untrusted Wi-Fi networks. 3. Use network segmentation and Wi-Fi monitoring tools to detect anomalous or malformed Wi-Fi frames that could indicate exploitation attempts. 4. Implement operational procedures to maintain manual control fallback and emergency landing protocols in case of communication loss. 5. Educate drone operators about the risk of Wi-Fi-based denial of service and encourage vigilance during drone flights. 6. Consider deploying drones with alternative communication methods or enhanced security features if available. 7. For critical missions, conduct risk assessments and have contingency plans to mitigate potential drone communication failures. 8. Collaborate with cybersecurity teams to integrate drone security into broader organizational security policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a857c5d1a09e29cb48ad42

Added to database: 3/4/2026, 4:03:17 PM

Last enriched: 3/4/2026, 4:17:42 PM

Last updated: 3/4/2026, 5:41:43 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses