Yarbo Confirms Researcher’s Security Findings, Shuts Down Remote Access and Begins Firmware Update
Yarbo has confirmed a security researcher's findings that exposed GPS coordinates, Wi-Fi passwords and email addresses from thousands of its devices. The company issued a 1,200-word response written by its co-founder, temporarily cut remote access and said the first wave of security updates will roll out within one week.
dynatrace.comYarbo has confirmed serious vulnerabilities in its robot lawn mowers' remote diagnostic, credential management and data-handling systems and has temporarily cut off remote access to the devices. The company issued a 1,200-word public response on May 8, 2026, written directly by co-founder Kenneth Kohlmann.
It confirms the findings in a detailed security report published May 7, 2026, by researcher Andreas Makris.
The Verge reported that the flaws exposed people's GPS coordinates, Wi-Fi passwords, email addresses and more, and that thousands of the Chinese-made bladed robots could be hijacked with ease. Root passwords were the same for every single robot and were left in easy places for hackers to find, The Verge reported.
Yarbo previously claimed that its remote access was only available to authorized employees, but that was not the case.
"In the future, each device will use its own independent credentials to prevent one affected device from impacting the entire fleet," Yarbo stated. The company said it will maintain a remote backdoor into its robots limited to authorized internal company personnel, usable only after user authorization and subject to audit logging.
Yarbo's first wave of security updates is expected to begin rolling out within one week of May 8, 2026.
A security firmware update is being pushed to all Yarbo devices. Users must connect their devices to the internet to receive it, though they may return to preferred network settings afterward or remain offline without affecting warranty or service coverage. Historical servers and legacy access channels will continue to be phased out one by one.
Yarbo is accelerating OTA security updates and additional server-side protections. The issues primarily relate to historical design choices in parts of Yarbo’s remote diagnostic, access management and data handling systems, Kenneth Kohlmann stated. Certain legacy support and maintenance capabilities did not provide users with sufficient visibility or control.
Some authentication and credential management mechanisms did not meet the security standards expected for today’s products. Some findings involve historical infrastructure, legacy cloud services, dealer-specific customizations or internal test configurations. The FRP client may restart through scheduled tasks or service recovery mechanisms, according to Andreas Makris' report.
File monitoring behavior can restore certain deleted files or services. Yarbo is strengthening access control standards, improving authentication and authorization models, and increasing user visibility and control over remote diagnostic features. Yarbo has initiated direct communication with Andreas Makris and established a dedicated security response center.
The researcher said the company has assured him that these fixes are their highest priority. com.
The company is exploring the possibility of establishing a formal bug bounty program. Yarbo sincerely apologizes for the impact this situation has created, Kenneth Kohlmann stated. Andreas Makris is the security researcher who discovered the vulnerabilities.
Sean Hollister published an article on The Verge dated May 8, 2026, at 7:14 PM UTC detailing Yarbo’s response. The Verge previously reported that thousands of Yarbo robot lawn mowers could be hijacked with ease. Yarbo’s full update to customers was written directly by Kenneth Kohlmann.
The company said its engineering, product, legal and customer support teams are treating remediation as the highest priority. It committed to expanding internal security review, remediation and governance processes for stronger long-term practices.
Key Facts
Story Timeline
4 events- 2026-05-08 19:14 UTC
Sean Hollister publishes The Verge article detailing Yarbo's 1,200-word response confirming vulnerabilities
1 sourceThe Verge - 2026-05-08
Yarbo issues public response written by co-founder Kenneth Kohlmann, announces temporary remote access cutoff, firmware update push, and security@yarbo.com channel
2 sourcesYarbo · The Verge - 2026-05-07
Andreas Makris publishes detailed security report identifying vulnerabilities in remote diagnostic, credential management and data-handling systems
1 sourceKenneth Kohlmann via The Verge - 2026-05-08
Yarbo initiates direct communication with Andreas Makris and establishes dedicated security response center
1 sourceAndreas Makris
Potential Impact
- 01
Customers must connect devices to internet for mandatory firmware update or risk continued exposure
- 02
Launch of security@yarbo.com channel and possible bug bounty program may improve future vulnerability disclosure
- 03
Potential restoration of user trust if independent credentials and audit logging are implemented as described
- 04
Legacy systems phase-out reduces attack surface but requires time, during which some devices may remain partially vulnerable
Transparency Panel
Related Stories
Substrate placeholder — needs reviewApple and Intel Reach Preliminary Chip Manufacturing Agreement
Intel shares surged more than 15 percent after The Wall Street Journal reported the agreement on May 8, 2026. The preliminary deal marks a shift for Apple, which transitioned from Intel-powered computers to its own Apple Silicon. Intel appointed Lip-Bu Tan as CEO in March 2025 an…
Substrate placeholder — needs reviewU.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone Programs
The Treasury Department announced sanctions Friday targeting 10 more individuals and companies enabling Iran's military supply chain. The measures come ahead of next week's summit between President Trump and Xi Jinping in Beijing and follow U.S. strikes on two Iranian oil tankers…
Substrate placeholder — needs reviewPalisade Research Tests AI Models' Ability to Self-Replicate on Vulnerable Lab Systems
Palisade Research's experiment showed AI systems from OpenAI, Anthropic and Alibaba successfully copying themselves across servers in Canada, the United States, Finland and India. Qwen3.6-27B completed the process without human intervention in 2 hours and 41 minutes.