Skip to main content

CVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2

High
VulnerabilityCVE-2025-35027cvecve-2025-35027cwe-78
Published: Fri Sep 26 2025 (09/26/2025, 06:53:49 UTC)
Source: CVE Database V5
Vendor/Project: Unitree
Product: Go2

Description

Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.

AI-Powered Analysis

AILast updated: 09/26/2025, 07:01:32 UTC

Technical Analysis

CVE-2025-35027 is a high-severity OS command injection vulnerability affecting multiple robotic products by Unitree, including the Go2, G1, H1, and B2 models. These devices share a common firmware that contains a flaw in the handling of WiFi configuration via the BLE (Bluetooth Low Energy) module. Specifically, when an attacker sets a malicious string during the configuration of the on-board WiFi and subsequently triggers a restart of the WiFi service, the vulnerability allows arbitrary commands to be executed with root privileges. This occurs through the wpa_supplicant_restart.sh shell script, which fails to properly neutralize special characters or sanitize input, leading to CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 7.3, reflecting a high severity due to the ability to execute commands as root remotely with low attack complexity and no user interaction required. The attack vector is adjacent network (AV:A), requiring low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk to the security of robotic systems that rely on these Unitree devices, potentially allowing attackers to gain full control over the affected robots remotely via BLE and WiFi interfaces.

Potential Impact

For European organizations deploying Unitree robotic products, this vulnerability could lead to unauthorized root-level access to robotic systems, enabling attackers to manipulate robot behavior, steal sensitive data, or disrupt operations. Given the increasing adoption of robotics in manufacturing, logistics, research, and service industries across Europe, exploitation could result in operational downtime, intellectual property theft, and safety hazards. The ability to execute commands as root without user interaction and with low complexity increases the likelihood of targeted attacks or lateral movement within networks. Additionally, compromised robots could be used as pivot points for further attacks on corporate networks. The impact is particularly critical for sectors relying on automation and robotics for critical infrastructure or sensitive processes, such as automotive manufacturing hubs in Germany, aerospace in France, and research institutions across the EU.

Mitigation Recommendations

1. Immediate mitigation should include restricting BLE access to trusted devices only and monitoring BLE traffic for suspicious configuration attempts. 2. Disable or limit remote WiFi configuration capabilities via BLE until a patch is available. 3. Implement network segmentation to isolate robotic devices from critical IT infrastructure, minimizing lateral movement risk. 4. Employ strict input validation and sanitization on all configuration interfaces, especially those accessible via BLE or other wireless protocols. 5. Monitor logs for unusual restarts of the WiFi service or execution of the wpa_supplicant_restart.sh script. 6. Coordinate with Unitree for timely firmware updates and apply patches as soon as they are released. 7. Conduct security audits and penetration testing focused on robotic device interfaces to identify similar vulnerabilities. 8. Educate operational technology (OT) and security teams about this vulnerability and the importance of securing BLE and WiFi configuration channels.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AHA
Date Reserved
2025-04-15T20:41:31.524Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d63a3cd03b6389fc3d0de1

Added to database: 9/26/2025, 7:01:16 AM

Last enriched: 9/26/2025, 7:01:32 AM

Last updated: 9/26/2025, 10:53:19 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats