The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a medical advisory for a critical vulnerability, CVE-2025-14346, affecting electric wheelchairs manufactured by WHILL Inc.. The flaw, which has a CVSS v3 score of 9.8 (Critical), allows a nearby, unauthenticated attacker to remotely take control of affected wheelchairs via Bluetooth. This could result in unauthorized movement, speed manipulation, and other dangerous actions, posing a direct threat to the physical safety of the user. The vulnerability impacts all versions of the WHILL Model C2 Electric Wheelchair and Model F Power Chair. The manufacturer has released mitigations to address the issue, and there are currently no known public exploits.
The root cause of CVE-2025-14346 is a lack of authentication for critical functions exposed over the device's Bluetooth connection. An attacker within Bluetooth range (approximately 30 feet or 10 meters) can discover and pair with a vulnerable wheelchair without requiring any credentials or user interaction. Once paired, the attacker gains the ability to send commands that are normally restricted to the legitimate user or caregiver. These commands include:
The vulnerability was discovered and reported by researchers at QED Secure Solutions.
The following products are affected by this vulnerability:
These devices are used globally within the Healthcare and Public Health sectors.
As of the CISA advisory, there are no known instances of active exploitation or public proof-of-concept exploits for this vulnerability. However, the low complexity of the attack means that it could be easily weaponized.
The impact of this vulnerability is extremely severe due to the direct risk of physical harm. An attacker could cause a wheelchair to move unexpectedly into traffic, accelerate beyond a safe speed, or become unresponsive to the user's controls. In a hospital or care facility setting, this could be used to cause chaos or target specific individuals. The psychological impact on users, who rely on these devices for mobility and independence, is also significant, as it erodes trust in the safety and security of their assistive technology.
| Type | Value | Description |
|---|---|---|
log_source |
Bluetooth Pairing Logs | On a paired mobile device, look for logs of unexpected or repeated pairing events with the wheelchair. |
other |
Unintended Wheelchair Movement | The most obvious indicator is the wheelchair moving or changing settings without user input. |
certificate_subject |
WHILL Bluetooth Device Name | Attackers may scan for Bluetooth devices with names identifying them as WHILL products. |
WHILL Inc. has deployed several mitigations on December 29, 2025, to address the vulnerability. Users and administrators should ensure these updates are applied:
CISA recommends users follow the guidance provided by WHILL and contact the manufacturer for specific update instructions.
Apply the firmware and mobile application updates provided by the manufacturer to implement the necessary security safeguards.
Mapped D3FEND Techniques:
The core issue is a lack of authentication. The fix involves implementing a form of authentication or verification before accepting critical commands.
Educate users on the risks and advise them on safe operating practices, such as powering off the device when not in use.
The only effective technical countermeasure for CVE-2025-14346 is to apply the software updates developed by WHILL Inc. This is not just a recommendation; it is a critical safety requirement. Users, caregivers, and healthcare facility administrators must ensure that both the wheelchair's firmware and the associated mobile application are updated to the latest versions. The firmware update reportedly adds a safeguard to prevent unauthorized speed changes, while the application update hardens the configuration and blocks certain commands during motion. This multi-layered software fix directly addresses the root cause of the vulnerability—the lack of authentication for critical functions. All other measures are merely procedural workarounds; patching is the definitive solution.
The vulnerability in the WHILL wheelchairs is a textbook case where Application Configuration Hardening is required. The flaw exists because the Bluetooth service on the device was configured to accept critical commands without authentication. The remediation provided by WHILL, which includes blocking unlock commands during motion and obfuscating configuration files, is a form of hardening. In general, for IoT and medical devices, all communication channels, especially wireless ones like Bluetooth, must be configured to require authentication and encryption for any function that can affect the device's state or safety. This should be a 'secure-by-default' principle during the design phase, preventing such critical vulnerabilities from ever reaching production.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats