Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
References
| Link | Resource |
|---|---|
| https://github.com/Bin4ry/UniPwn | Exploit Technical Description |
| https://spectrum.ieee.org/unitree-robot-exploit | Press/Media Coverage |
| https://takeonme.org/cves/cve-2025-35027 | Exploit Third Party Advisory |
| https://www.cve.org/cverecord?id=CVE-2025-60017 | Third Party Advisory |
| https://www.cve.org/cverecord?id=CVE-2025-60250 | Third Party Advisory |
| https://x.com/committeeonccp/status/1971250635548033311 | Press/Media Coverage |
| https://github.com/Bin4ry/UniPwn | Exploit Technical Description |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
12 Jan 2026, 16:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Bin4ry/UniPwn - Exploit, Technical Description | |
| References | () https://spectrum.ieee.org/unitree-robot-exploit - Press/Media Coverage | |
| References | () https://takeonme.org/cves/cve-2025-35027 - Exploit, Third Party Advisory | |
| References | () https://www.cve.org/cverecord?id=CVE-2025-60017 - Third Party Advisory | |
| References | () https://www.cve.org/cverecord?id=CVE-2025-60250 - Third Party Advisory | |
| References | () https://x.com/committeeonccp/status/1971250635548033311 - Press/Media Coverage | |
| First Time |
Unitree b2 Firmware
Unitree g1 Unitree b2 Unitree go2 Unitree Unitree go2 Firmware Unitree h1 Firmware Unitree g1 Firmware Unitree h1 |
|
| CPE | cpe:2.3:o:unitree:h1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:unitree:g1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:unitree:go2:-:*:*:*:*:*:*:* cpe:2.3:o:unitree:b2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:unitree:g1:-:*:*:*:*:*:*:* cpe:2.3:h:unitree:b2:-:*:*:*:*:*:*:* cpe:2.3:h:unitree:h1:-:*:*:*:*:*:*:* cpe:2.3:o:unitree:go2_firmware:*:*:*:*:*:*:*:* |
30 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Bin4ry/UniPwn - |
26 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches. |
26 Sep 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
26 Sep 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-26 07:15
Updated : 2026-01-12 16:54
NVD link : CVE-2025-35027
Mitre link : CVE-2025-35027
CVE.ORG link : CVE-2025-35027
JSON object : View
Products Affected
unitree
- go2
- h1_firmware
- h1
- g1
- go2_firmware
- g1_firmware
- b2_firmware
- b2
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
