Jump to content

ExpressLRS

From Wikipedia, the free encyclopedia

ExpressLRS is an open-source radio control link protocol designed for low latency and long-range communication in RC applications such as drones and aircraft. It supports packet rates up to 500 Hz, with plans for 1000 Hz, and latency as low as 5 milliseconds, operating on both 2.4 GHz and 915/868 MHz frequency bands.[1]

In 2022, a security vulnerability in ExpressLRS was reported, allowing remote takeover of drones. The issue stemmed from the protocol's use of a "binding phrase" encrypted with the outdated MD5 hashing algorithm[dubiousdiscuss]. Sync packets leaked most of the unique identifier used to pair transmitter and receiver, enabling attackers to reconstruct the remaining data and hijack the communication link. Recommendations to address the vulnerability included eliminating the transmission of the UID over the air, improving random number generation, and securing frequency hopping mechanisms.[2]

In 2024, the Ukrainian company Obriy Miltech reported difficulties in jamming ExpressLRS with its electronic warfare system, "Horizon ANTIFPV". While other protocols could be largely suppressed, ExpressLRS, especially with remote antennas, remained resistant to disruption. No system in Ukraine was said to guarantee reliable jamming of ExpressLRS-controlled drones.[3]

See also

[edit]

References

[edit]
  1. ^ Conradie, Danie (19 January 2021). "ExpressLRS: Open Source, Low Latency, Long Range RC Protocol". Hackaday. Retrieved 26 April 2025.
  2. ^ "Hack Allows Drone Takeover Via 'ExpressLRS' Protocol". threatpost.com. 7 July 2022. Retrieved 26 April 2025.
  3. ^ "Perspective Market of Ukrainian Short-Range EW Systems". Militarnyi. 24 April 2024. Retrieved 26 April 2025.
[edit]