Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 29 Sep 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Unitree
Unitree b2 Unitree g1 Unitree go2 Unitree h1 |
|
Vendors & Products |
Unitree
Unitree b2 Unitree g1 Unitree go2 Unitree h1 |
Fri, 26 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. | Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches. |
Fri, 26 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 26 Sep 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 26 Sep 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. | |
Title | Unitree Multiple Robotic Products Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AHA
Published: 2025-09-26T06:53:49.585Z
Updated: 2025-09-30T18:05:04.102Z
Reserved: 2025-04-15T20:41:31.524Z
Link: CVE-2025-35027

Updated: 2025-09-30T18:04:54.252Z

Status : Awaiting Analysis
Published: 2025-09-26T07:15:41.413
Modified: 2025-09-30T18:15:49.780
Link: CVE-2025-35027

No data.