Unitree Go2, G1, H1, and B2 devices through 2025-09-20 allow root OS command injection via the hostapd_restart.sh wifi_ssid or wifi_pass parameter (within restart_wifi_ap and restart_wifi_sta).
Metrics
Affected Vendors & Products
References
History
Fri, 26 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Unitree
Unitree b2 Unitree g1 Unitree go2 Unitree h1 |
|
Vendors & Products |
Unitree
Unitree b2 Unitree g1 Unitree go2 Unitree h1 |
Fri, 26 Sep 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 26 Sep 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Unitree Go2, G1, H1, and B2 devices through 2025-09-20 allow root OS command injection via the hostapd_restart.sh wifi_ssid or wifi_pass parameter (within restart_wifi_ap and restart_wifi_sta). | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-09-26T00:00:00.000Z
Updated: 2025-09-26T19:17:06.504Z
Reserved: 2025-09-23T00:00:00.000Z
Link: CVE-2025-60017

Updated: 2025-09-26T19:16:57.416Z

Status : Awaiting Analysis
Published: 2025-09-26T01:15:36.883
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-60017

No data.