DMZ Weapons Research Bugged Explained

Are you unable to complete the “Extract an enemy operator’s weapons” task in DMZ? You would be correct if you think that the DMZ Weapons Research mission is bugged. Since the release of Warzone 2 this November, the game’s extraction mode – DMZ – has been one of the biggest positive surprises. Many players are having fun with it, and it has attracted a lot of gamers. However, it has also arrived with quite a few bugs, which are currently plaguing the experience. In this guide, we explain the “Weapons Research Bugged” issue.

DMZ Weapons Research Bugged Explained

Extract an Enemy Operator’s Weapons Bugged, DMZ Weapons Research Mission Not Working Explained

DMZ’s Weapons Research is a Tier 1 mission for the faction Black Mous. On paper, it should be one of the game’s easiest and most straightforward quests. The first task requires players to “Complete 1 Hunt contract”. And then, the second part asks players to “Extract an enemy operator’s weapons“. And while the first part is working as intended, it is the second task that is troubling the player base. Namely, it appears that the second task is wholly bugged and won’t work. At the time of writing, to the best of our knowledge, there are no workarounds that could potentially fix this issue.

';document.getElementById("serge_5f895c6208f81a315320ec57").style.display = "block"; }

“I have tried looting from backup into active weapon slot, stowing weapon in the backpack, looting an insured weapon from a backpack, looting a contraband weapon from a backpack, looting a weapon that was dropped by the player all in different games and all with exfils and nothing seems to work,” says Reddit user zzarGrazz. And he is far from being the only one with this issue.

For now, the best thing you can do is skip this mission. You will be able to progress to the next tier even without it. Unfortunately, we will have to wait for the developers to fix the issue. Until then, avoid this mission, as you will most likely be unable to complete it. If we stumble upon a working solution, we will make sure to update the article! And, of course, if you know a workaround – share it with us in the comments section!

ncG1vNJzZmivp6x7qLvSrqWop5JjsLC5jpymnWWnlr%2B7u82eZGtnlKLHbsPEmqeopqNiv6a%2FxJqpnKBdl8Kos8SdZJ6woKGuqrrEnWY%3D