CVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.
AI Analysis
Technical Summary
CVE-2025-35027 is a high-severity OS command injection vulnerability affecting multiple robotic products by Unitree, including the Go2, G1, H1, and B2 models. These devices share a common firmware that contains a flaw in the handling of WiFi configuration via the BLE (Bluetooth Low Energy) module. Specifically, when an attacker sets a malicious string during the configuration of the on-board WiFi and subsequently triggers a restart of the WiFi service, the vulnerability allows arbitrary commands to be executed with root privileges. This occurs through the wpa_supplicant_restart.sh shell script, which fails to properly neutralize special characters or sanitize input, leading to CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 7.3, reflecting a high severity due to the ability to execute commands as root remotely with low attack complexity and no user interaction required. The attack vector is adjacent network (AV:A), requiring low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk to the security of robotic systems that rely on these Unitree devices, potentially allowing attackers to gain full control over the affected robots remotely via BLE and WiFi interfaces.
Potential Impact
For European organizations deploying Unitree robotic products, this vulnerability could lead to unauthorized root-level access to robotic systems, enabling attackers to manipulate robot behavior, steal sensitive data, or disrupt operations. Given the increasing adoption of robotics in manufacturing, logistics, research, and service industries across Europe, exploitation could result in operational downtime, intellectual property theft, and safety hazards. The ability to execute commands as root without user interaction and with low complexity increases the likelihood of targeted attacks or lateral movement within networks. Additionally, compromised robots could be used as pivot points for further attacks on corporate networks. The impact is particularly critical for sectors relying on automation and robotics for critical infrastructure or sensitive processes, such as automotive manufacturing hubs in Germany, aerospace in France, and research institutions across the EU.
Mitigation Recommendations
1. Immediate mitigation should include restricting BLE access to trusted devices only and monitoring BLE traffic for suspicious configuration attempts. 2. Disable or limit remote WiFi configuration capabilities via BLE until a patch is available. 3. Implement network segmentation to isolate robotic devices from critical IT infrastructure, minimizing lateral movement risk. 4. Employ strict input validation and sanitization on all configuration interfaces, especially those accessible via BLE or other wireless protocols. 5. Monitor logs for unusual restarts of the WiFi service or execution of the wpa_supplicant_restart.sh script. 6. Coordinate with Unitree for timely firmware updates and apply patches as soon as they are released. 7. Conduct security audits and penetration testing focused on robotic device interfaces to identify similar vulnerabilities. 8. Educate operational technology (OT) and security teams about this vulnerability and the importance of securing BLE and WiFi configuration channels.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Belgium
CVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
Description
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.
AI-Powered Analysis
Technical Analysis
CVE-2025-35027 is a high-severity OS command injection vulnerability affecting multiple robotic products by Unitree, including the Go2, G1, H1, and B2 models. These devices share a common firmware that contains a flaw in the handling of WiFi configuration via the BLE (Bluetooth Low Energy) module. Specifically, when an attacker sets a malicious string during the configuration of the on-board WiFi and subsequently triggers a restart of the WiFi service, the vulnerability allows arbitrary commands to be executed with root privileges. This occurs through the wpa_supplicant_restart.sh shell script, which fails to properly neutralize special characters or sanitize input, leading to CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 7.3, reflecting a high severity due to the ability to execute commands as root remotely with low attack complexity and no user interaction required. The attack vector is adjacent network (AV:A), requiring low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk to the security of robotic systems that rely on these Unitree devices, potentially allowing attackers to gain full control over the affected robots remotely via BLE and WiFi interfaces.
Potential Impact
For European organizations deploying Unitree robotic products, this vulnerability could lead to unauthorized root-level access to robotic systems, enabling attackers to manipulate robot behavior, steal sensitive data, or disrupt operations. Given the increasing adoption of robotics in manufacturing, logistics, research, and service industries across Europe, exploitation could result in operational downtime, intellectual property theft, and safety hazards. The ability to execute commands as root without user interaction and with low complexity increases the likelihood of targeted attacks or lateral movement within networks. Additionally, compromised robots could be used as pivot points for further attacks on corporate networks. The impact is particularly critical for sectors relying on automation and robotics for critical infrastructure or sensitive processes, such as automotive manufacturing hubs in Germany, aerospace in France, and research institutions across the EU.
Mitigation Recommendations
1. Immediate mitigation should include restricting BLE access to trusted devices only and monitoring BLE traffic for suspicious configuration attempts. 2. Disable or limit remote WiFi configuration capabilities via BLE until a patch is available. 3. Implement network segmentation to isolate robotic devices from critical IT infrastructure, minimizing lateral movement risk. 4. Employ strict input validation and sanitization on all configuration interfaces, especially those accessible via BLE or other wireless protocols. 5. Monitor logs for unusual restarts of the WiFi service or execution of the wpa_supplicant_restart.sh script. 6. Coordinate with Unitree for timely firmware updates and apply patches as soon as they are released. 7. Conduct security audits and penetration testing focused on robotic device interfaces to identify similar vulnerabilities. 8. Educate operational technology (OT) and security teams about this vulnerability and the importance of securing BLE and WiFi configuration channels.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AHA
- Date Reserved
- 2025-04-15T20:41:31.524Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d63a3cd03b6389fc3d0de1
Added to database: 9/26/2025, 7:01:16 AM
Last enriched: 9/26/2025, 7:01:32 AM
Last updated: 9/26/2025, 10:53:19 AM
Views: 5
Related Threats
CVE-2025-11012: Stack-based Buffer Overflow in BehaviorTree
MediumCVE-2025-11011: NULL Pointer Dereference in BehaviorTree
MediumCVE-2025-10544: CWE-434 Unrestricted Upload of File with Dangerous Type in AvePoint DocAve
HighCVE-2025-1396: Vulnerability in WSO2 WSO2 Identity Server
LowCVE-2025-54831: CWE-213 Exposure of Sensitive Information Due to Incompatible Policies in Apache Software Foundation Apache Airflow
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.