CVE-2026-1743

A vulnerability has been found in DJI Mavic Mini, Air, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en DJI Mavic Mini, Air, Spark y Mini SE hasta 01.00.0500. Afectada por esta vulnerabilidad es una funcionalidad desconocida del componente Enhanced Wi-Fi Pairing. La manipulación conduce a una omisión de autenticación mediante captura-repetición. El ataque debe llevarse a cabo desde dentro de la red local. Un alto grado de complejidad es necesario para el ataque. La explotación parece ser difícil. El exploit ha sido revelado al público y puede ser utilizado. El proveedor fue contactado con antelación sobre esta revelación pero no respondió de ninguna manera.

02 Feb 2026, 07:16

Type Values Removed Values Added
Summary (en) A vulnerability has been found in DJI Mavic Mini, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability has been found in DJI Mavic Mini, Air, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

02 Feb 2026, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-02 04:15

Updated : 2026-04-29 01:00


NVD link : CVE-2026-1743

Mitre link : CVE-2026-1743

CVE.ORG link : CVE-2026-1743


JSON object : View

Products Affected

No product.

CWE
CWE-287

Improper Authentication

CWE-294

Authentication Bypass by Capture-replay