CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product

By Published On: January 2, 2026

 

CISA Warns: Critical Vulnerability in WHILL Wheelchairs Opens Door to Remote Takeover

The safety and independence of individuals relying on personal mobility devices are paramount. However, a recent advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) has cast a concerning shadow over the security of popular electric wheelchairs. A critical vulnerability discovered in WHILL Inc.’s Model C2 Electric Wheelchair and Model F Power Chair could allow attackers to remotely hijack these devices via Bluetooth, posing a significant risk to users’ well-being and control.

This urgent warning underscores the growing importance of cybersecurity in the realm of Internet of Things (IoT) devices, particularly those with direct impacts on personal safety. For IT professionals, security analysts, and healthcare providers, understanding the nature of this threat and implementing timely remediation is crucial.

The Vulnerability: Unpacking the Remote Takeover Threat

Security researchers from QED Secure Solutions unearthed severe vulnerabilities within the WHILL Model C2 Electric Wheelchair and Model F Power Chair. These devices, known for enhancing mobility and independence, are now at risk due to critical flaws in their Bluetooth communication protocols.

Specifically, the vulnerability, identified as CVE-2023-45604 and CVE-2023-45605, allows an unauthenticated attacker within Bluetooth range to initiate a remote connection and send unauthorized control commands to the wheelchair. This means an adversary could potentially manipulate the device’s movement, speed, and direction without the user’s consent or knowledge. The implications range from minor disruptions to severe accidents, endangering the user and those around them.

The affected models, widely used across the globe, are products of Japan-based WHILL Inc. The ease of exploitation, requiring only Bluetooth proximity and no prior authentication, elevates this vulnerability to a high-severity threat demanding immediate attention.

Affected Devices and Potential Impact

The CISA advisory specifically targets two prominent WHILL models:

  • WHILL Model C2 Electric Wheelchair: A popular, versatile personal mobility device.
  • WHILL Model F Power Chair: Another widely used model offering enhanced mobility.

The potential impact of this vulnerability is multifaceted and severe:

  • Physical Harm: Unauthorized manipulation of the wheelchair could lead to crashes, falls, and injuries for the user.
  • Loss of Control: Users may experience a complete loss of control over their device, leading to distress and potential danger.
  • Privacy Risks: While not explicitly detailed, unauthorized access to connected devices always carries potential, albeit indirect, privacy implications.
  • Reputational Damage: For manufacturers, such vulnerabilities significantly undermine user trust and brand reputation.

Remediation Actions and Mitigations

Addressing this critical vulnerability requires prompt action from both WHILL Inc. and the users of the affected wheelchairs. While the ideal solution involves a manufacturer-issued patch, users can take several immediate steps to mitigate the risk.

  • Manufacturer Patch/Firmware Update: WHILL Inc. has released firmware updates to address these vulnerabilities. It is imperative for users to update their devices to the latest firmware version as soon as possible. Users should consult the official WHILL website or their authorized dealer for instructions on how to perform these updates.
  • Limit Bluetooth Exposure: When not actively using the WHILL mobile app to control the wheelchair, users should disable Bluetooth on their smartphone or tablet to prevent unintended connections.
  • Maintain Awareness: Users should remain vigilant for any unusual or unexpected behavior from their wheelchair. If a device acts erratically or seems to respond to commands not initiated by the user, immediate investigation is warranted.
  • Secure Operating Environment: While difficult to enforce for personal devices, users should be encouraged to operate their wheelchairs in secure environments and be aware of their surroundings, especially in public spaces where an attacker could be within Bluetooth range.

Tools for Vulnerability Assessment and Mitigation

Maintaining the security of IoT and connected medical devices often involves a combination of general cybersecurity practices and specific vendor-provided tools. While specific tools for detecting this particular wheelchair vulnerability are limited to vendor-provided updates, general Bluetooth security tools and practices are relevant.

Tool Name Purpose Link
WHILL Official Support Channels Accessing official firmware updates and support. https://whill.inc/us/support/ (or region-specific link)
Bluetooth Scanner Apps (e.g., nRF Connect) Identifying active Bluetooth devices and connections. (Primarily for analysis, not direct mitigation) Android / iOS
Packet Sniffers (e.g., Wireshark with Bluetooth Dongle) Analyzing Bluetooth traffic for suspicious patterns. (For advanced security researchers) https://www.wireshark.org/

Protecting Personal Mobility: A Shared Responsibility

The CISA warning regarding WHILL wheelchairs serves as a stark reminder that cyber threats extend beyond traditional IT infrastructure, impacting devices directly critical to personal mobility and daily life. The vulnerabilities CVE-2023-45604 and CVE-2023-45605 highlight the need for robust security-by-design principles in IoT device development and proactive vigilance from users and support professionals.

For individuals, promptly updating device firmware and managing Bluetooth connections are critical steps. For manufacturers, continuous security audits and transparent communication about vulnerabilities are essential to maintaining trust. This incident reinforces the collective responsibility to secure increasingly connected personal devices, ensuring both functionality and safety.

 

Share this article

Leave A Comment