E-Tools

Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline

Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline
News
By Jowi Morales published 23 hours ago
The smart vacuum cleaner was remotely bricked for not collecting data.








(35)
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

a smart vacuum being set up with a smart phone
(Image credit: Getty Images)
An engineer got curious about how his iLife A11 smart vacuum worked and monitored the network traffic coming from the device. That’s when he noticed it was constantly sending logs and telemetry data to the manufacturer — something he hadn't consented to. The user, Harishankar, decided to block the telemetry servers' IP addresses on his network, while keeping the firmware and OTA servers open. While his smart gadget worked for a while, it just refused to turn on soon after. After a lengthy investigation, he discovered that a remote kill command had been issued to his device.

Advertisement

He sent it to the service center multiple times, wherein the technicians would turn it on and see nothing wrong with the vacuum. When they returned it to him, it would work for a few days and then fail to boot again. After several rounds of back-and-forth, the service center probably got tired and just stopped accepting it, saying it was out of warranty. Because of this, he decided to disassemble the thing to determine what killed it and to see if he could get it working again.

Since the A11 was a smart device, it had an AllWinner A33 SoC with a TinaLinux operating system, plus a GD32F103 microcontroller to manage its plethora of sensors, including Lidar, gyroscopes, and encoders. He created PCB connectors and wrote Python scripts to control them with a computer, presumably to test each piece individually and identify what went wrong. From there, he built a Raspberry Pi joystick to manually drive the vacuum, proving that there was nothing wrong with the hardware.


LATEST VIDEOS FROM TOM'S HARDWARE
YOU MAY LIKE
washing machine with clothes
Hacker breaks into on-campus smart washing machines
Speed camera
Bizarre cyberattack blamed on Russia and China-linked hackers permanently breaks dozens of speed cameras in the Netherlands
AWS
AWS accused of a ‘digital execution’ after it deleted 10 years of users' data without warning
the PCB of the iLife A11

(Image credit: Harishankar)
From this, he looked at its software and operating system, and that’s where he discovered the dark truth: his smart vacuum was a security nightmare and a black hole for his personal data. First of all, it's Android Debug Bridge, which gives him full root access to the vacuum, wasn't protected by any kind of password or encryption. The manufacturer added a makeshift security protocol by omitting a crucial file, which caused it to disconnect soon after booting, but Harishankar easily bypassed it. He then discovered that it used Google Cartographer to build a live 3D map of his home.

Advertisement

This isn’t unusual, by far. After all, it’s a smart vacuum, and it needs that data to navigate around his home. However, the concerning thing is that it was sending off all this data to the manufacturer’s server. It makes sense for the device to send this data to the manufacturer, as its onboard SoC is nowhere near powerful enough to process all that data. However, it seems that iLife did not clear this with its customers. Furthermore, the engineer made one disturbing discovery — deep in the logs of his non-functioning smart vacuum, he found a command with a timestamp that matched exactly the time the gadget stopped working. This was clearly a kill command, and after he reversed it and rebooted the appliance, it roared back to life.

a smart vacuum's components and sensors

(Image credit: Harishankar)

So, why did the A11 work at the service center but refuse to run in his home? The technicians would reset the firmware on the smart vacuum, thus removing the kill code, and then connect it to an open network, making it run normally. But once it connected again to the network that had its telemetry servers blocked, it was bricked remotely because it couldn’t communicate with the manufacturer’s servers. Since he blocked the appliance’s data collection capabilities, its maker decided to just kill it altogether. "Someone—or something—had remotely issued a kill command,” says Harishankar. “Whether it was intentional punishment or automated enforcement of 'compliance,' the result was the same: a consumer device had turned on its owner.”

Unfortunately, many other smart vacuum brands use similar hardware, so it’s not far-fetched to think that they have the same setup. This is likely especially true for cheaper devices that have less capable hardware and aren’t capable of edge computing, meaning they’ll have to send the data to some faraway server for processing. But because your information is being offboarded to another device outside of your control, you really have no idea what’s happening to it, giving the manufacturer free rein to use it as it pleases.

Advertisement

Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Summary
Smart vacuum user Harishankar discovers that his iLife A11 smart vacuum is sending data to the manufacturer without his consent. He blocks the telemetry servers' IP addresses, but the device is remotely bricked by a kill command. After multiple unsuccessful attempts at service center repair, he
Reading History
Date Name Words Time WPM
2025/11/02 18:26 Anonymous 867 - -
Statistics

867

Words

1

Read Count
Details

ID: eb3a6e1f-5599-40f7-aaba-a1fac054c0ef

Category ID: article

Date: Nov. 2, 2025

Created: 2025/11/02 18:26

Updated: 2025/12/07 22:54

Last Read: 2025/11/02 18:26

Actions