Description
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version
Any version
Credits
Andreas Makris
Kevin Finisterre
Konstantin Severov
todb
References
takeonme.org/cves/cve-2025-35027
github.com/Bin4ry/UniPwn
spectrum.ieee.org/unitree-robot-exploit
x.com/committeeonccp/status/1971250635548033311
www.cve.org/cverecord?id=CVE-2025-60017
www.cve.org/cverecord?id=CVE-2025-60250