A software engineer's innocent attempt to control his DJI Romo robot vacuum with a PlayStation 5 controller inadvertently exposed a massive security flaw, granting him access to nearly 7,000 robot vacuums across 24 countries.
The incident, first reported by The Verge, underscores the growing privacy risks posed by internet-connected smart home devices—particularly as artificial intelligence (AI)-powered coding tools make it easier for unintended vulnerabilities to be exploited.
Sammy Azdoufal, who leads AI strategy at a vacation rental company, was merely experimenting with his new $2,000 DJI Romo—a high-end autonomous vacuum roughly the size of a small fridge—when he stumbled upon the alarming oversight. Using Anthropic's Claude Code, an AI coding assistant, he reverse-engineered how the vacuum communicated with DJI's cloud servers to build a custom remote-control app.
But instead of gaining access only to his own device, Azdoufal found himself with administrative-level permissions for thousands of others. "I didn't bypass, I didn't crack, brute force, whatever," the software engineer told The Verge. "I found my device was just one in an ocean of devices."
The flaw allowed him to:
In a live demonstration, Azdoufal showed how he could pinpoint a journalist's test vacuum, view its battery status, and map out the interior of their home—all without hacking DJI's servers.
DJI acknowledged the vulnerability after being alerted by The Verge and Popular Science. The company stated: "DJI identified a vulnerability affecting DJI Home through internal review in late January and initiated remediation immediately. The issue was addressed through two updates, with an initial patch deployed on Feb. 8 and a follow-up update completed on Feb. 10."
However, experts warn that the incident highlights a broader issue: smart home devices often prioritize convenience over security, leaving users unknowingly exposed.
Azdoufal's discovery was made possible by AI-assisted coding, which lowers the barrier for uncovering vulnerabilities—whether intentionally or accidentally. As AI tools like Claude Code streamline software development, they also risk amplifying security flaws by making it easier for individuals (or malicious actors) to probe systems without deep technical expertise.
Moreover, the breach raises concerns about foreign-made smart devices, particularly those from Chinese manufacturers like DJI. U.S. lawmakers have long warned that such products could be exploited for surveillance—though concrete evidence remains scarce.
This incident follows other high-profile smart home privacy scares:
With 54 million U.S. households already using smart home devices—and humanoid home robots like Tesla's Optimus on the horizon—experts warn that unchecked vulnerabilities could turn everyday appliances into surveillance tools.
BrightU.AI's Enoch engine explains that smart home devices—ranging from smart meters to voice assistants, connected appliances and security systems—are marketed as revolutionary tools for convenience, energy efficiency, and modern living. However, beneath this glossy facade lies a multifaceted threat to personal privacy, health and autonomy.
While DJI claims the flaw is fixed, consumers should:
Azdoufal, who never intended to expose such a massive flaw, summed it up best: "All I wanted was to drive my robot around with a joystick." Yet his accidental discovery serves as a stark reminder: In the rush to adopt smart home tech, security must not be an afterthought.
Watch this video explaining how your robot vacuum is spying on you.
This video is from the TNTVNEWS channel on Brighteon.com.
Sources include: