CVE-2026-27509

Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, unauthenticated attacker can join DDS domain 0 and publish a crafted message (api_id=1002) containing arbitrary Python, which the robot writes to disk under /unitree/etc/programming/ and binds to a physical controller keybinding. When the keybinding is pressed, the code executes as root and the binding persists across reboots.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:unitree:go2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:unitree:go2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:unitree:go2_edu_firmware:1.1.11:*:*:*:*:*:*:*
cpe:2.3:h:unitree:go2_edu:-:*:*:*:*:*:*:*

History

12 Mar 2026, 20:17

Type Values Removed Values Added
First Time Unitree go2 Edu
Unitree
Unitree go2 Edu Firmware
Unitree go2
Unitree go2 Firmware
CPE cpe:2.3:h:unitree:go2_edu:-:*:*:*:*:*:*:*
cpe:2.3:o:unitree:go2_edu_firmware:1.1.11:*:*:*:*:*:*:*
cpe:2.3:o:unitree:go2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:unitree:go2:-:*:*:*:*:*:*:*
References () https://boschko.ca/unitree-go2-rce/ - () https://boschko.ca/unitree-go2-rce/ - Exploit, Third Party Advisory
References () https://shop.unitree.com/products/unitree-go2 - () https://shop.unitree.com/products/unitree-go2 - Product
References () https://www.vulncheck.com/advisories/unitree-go2-missing-dds-authentication-enables-adjacent-rce - () https://www.vulncheck.com/advisories/unitree-go2-missing-dds-authentication-enables-adjacent-rce - Third Party Advisory

27 Feb 2026, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) Las versiones de firmware de Unitree Go2 V1.1.7 a V1.1.9 y V1.1.11 (EDU) no implementan autenticación ni autorización DDS para el tema de Eclipse CycloneDDS rt/api/programming_actuator/request gestionado por actuator_manager.py. Un atacante adyacente a la red y no autenticado puede unirse al dominio DDS 0 y publicar un mensaje manipulado (api_id=1002) que contiene Python arbitrario, el cual el robot escribe en el disco bajo /unitree/etc/programming/ y lo vincula a una asignación de teclas de un controlador físico. Cuando se pulsa la asignación de teclas, el código se ejecuta como root y la vinculación persiste a través de los reinicios.

26 Feb 2026, 20:31

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-26 20:31

Updated : 2026-03-12 20:17


NVD link : CVE-2026-27509

Mitre link : CVE-2026-27509

CVE.ORG link : CVE-2026-27509


JSON object : View

Products Affected

unitree

  • go2
  • go2_edu_firmware
  • go2_firmware
  • go2_edu
CWE
CWE-306

Missing Authentication for Critical Function