Home

Description

Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.

PUBLISHED Reserved 2025-04-15 | Published 2025-09-26 | Updated 2025-09-30 | Assigner AHA




HIGH: 7.3CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Credits

Andreas Makris finder

Kevin Finisterre finder

Konstantin Severov finder

todb coordinator

References

takeonme.org/cves/cve-2025-35027 third-party-advisory

github.com/Bin4ry/UniPwn technical-description

spectrum.ieee.org/unitree-robot-exploit media-coverage

x.com/committeeonccp/status/1971250635548033311 government-resource

www.cve.org/cverecord?id=CVE-2025-60017 related

www.cve.org/cverecord?id=CVE-2025-60250 related

cve.org (CVE-2025-35027)

nvd.nist.gov (CVE-2025-35027)

Download JSON