Home

Description

Since the encryption algorithm used to protect firmware updates is itself encrypted using key material available to an attacker (or anyone paying attention), the firmware updates may be altered by an unauthorized user, and then trusted by a Unitree product, such as the Unitree Go2 and other models. This issue appears to affect all of Unitree’s current offerings as of February 26, 2026, and so should be considered a vulnerability in both the firmware generation and extraction processes. At the time of this release, there is no publicly-documented mechanism to subvert the update process and insert poisoned firmware packages without the equipment owner’s knowledge.

PUBLISHED Reserved 2026-01-26 | Published 2026-02-27 | Updated 2026-02-27 | Assigner AHA




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-321: Use of Hard-coded Cryptographic Key

Product status

Default status
unaffected

Any version
affected

Credits

Andreas Makris aka Bin4ry finder

todb coordinator

References

takeonme.org/...00000000000000000000000000000000000000000101 third-party-advisory

github.com/Bin4ry/UniTEABag exploit

www.linkedin.com/...botics-activity-7432984361014091776-zB4D related

x.com/bin4rydigit/status/2027197985625420242 related

cve.org (CVE-2026-1442)

nvd.nist.gov (CVE-2026-1442)

Download JSON