. The attacker needs to be present on the local network. A high complexity level is associated with this attack. The exploitability is told to be difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A weakness has been identified in DJI Mavic Spark, Mavic Air and Mavic Mini 01.00.0500. Affected is an unknown function of the component Telemetry Channel. Executing manipulation can lead to use of hard-coded cryptographic key . The attacker needs to be present on the local network. A high complexity level is associated with this attack. The exploitability is told to be difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer. | |
Title | DJI Mavic Spark/Mavic Air/Mavic Mini Telemetry Channel hard-coded key | |
Weaknesses | CWE-320 CWE-321 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-11T11:32:06.456Z
Reserved: 2025-09-11T05:12:36.364Z
Link: CVE-2025-10250

No data.

Status : Received
Published: 2025-09-11T12:15:33.677
Modified: 2025-09-11T12:15:33.677
Link: CVE-2025-10250

No data.

No data.