Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2

0
High
VulnerabilityCVE-2025-35027cvecve-2025-35027cwe-78
Published: Fri Sep 26 2025 (09/26/2025, 06:53:49 UTC)
Source: CVE Database V5
Vendor/Project: Unitree
Product: Go2

Description

Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.

AI-Powered Analysis

AILast updated: 10/11/2025, 00:44:56 UTC

Technical Analysis

CVE-2025-35027 is an OS command injection vulnerability categorized under CWE-78 that affects multiple robotic products from Unitree Robotics, including the Go2 quadruped robot, G1 humanoid, H1, and B2 models. These devices share a common firmware codebase derived from the MIT Cheetah project, with two major forks for different robot types. The vulnerability is triggered when an attacker sets a maliciously crafted string during the configuration of the on-board WiFi via the robot's Bluetooth Low Energy (BLE) module. This malicious input is not properly sanitized or neutralized before being passed to the wpa_supplicant_restart.sh shell script, which is responsible for restarting the WiFi service. When the WiFi service is restarted, the injected commands execute with root privileges, enabling full system compromise. The attack vector requires an attacker to have low-level privileges (PR:L) and network access (AV:A), but no user interaction is needed (UI:N). The vulnerability was published on September 26, 2025, with a CVSS v3.1 score of 7.3, indicating high severity. No public exploits are known at this time, but the potential impact includes unauthorized command execution, data confidentiality breaches, and integrity violations. The vulnerability affects all versions of the firmware as indicated, and no patches have been linked yet. The root cause is improper input validation and neutralization of special characters in the WiFi configuration process, a critical oversight given the privileged execution context of the restart script.

Potential Impact

For European organizations deploying Unitree robotic products, this vulnerability poses a significant risk to operational security and data confidentiality. Robots used in industrial automation, research labs, logistics, or security patrols could be commandeered by attackers to execute arbitrary commands as root, potentially leading to data theft, sabotage, or disruption of critical robotic functions. The ability to execute commands at root level without user interaction increases the risk of stealthy persistent attacks. Compromise of these robots could also serve as a pivot point for lateral movement within enterprise networks, especially in environments where robots are integrated with other critical systems. The impact on availability is less direct but could occur if attackers disable WiFi or robot functions. Given the growing adoption of robotics in European manufacturing and research sectors, the threat could affect sensitive intellectual property and operational continuity. The lack of known exploits currently provides a window for mitigation, but the vulnerability’s nature suggests it could be weaponized quickly once exploited in the wild.

Mitigation Recommendations

1. Immediately restrict BLE module access to trusted devices only, using strong authentication and encryption to prevent unauthorized WiFi configuration attempts. 2. Implement strict input validation and sanitization on all WiFi configuration parameters, especially those received via BLE, to neutralize special characters that could lead to command injection. 3. Monitor and log all WiFi configuration changes and service restarts to detect anomalous or unauthorized activities. 4. Isolate robotic devices on segmented networks with limited access to critical infrastructure to reduce attack surface and lateral movement risk. 5. Deploy host-based intrusion detection systems (HIDS) on robots if supported, to detect suspicious command executions. 6. Coordinate with Unitree Robotics for timely firmware updates and apply patches as soon as they become available. 7. Conduct security audits and penetration testing focused on BLE interfaces and WiFi configuration mechanisms. 8. Educate operational staff on the risks of BLE-based configuration and enforce strict operational security policies around robot management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AHA
Date Reserved
2025-04-15T20:41:31.524Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d63a3cd03b6389fc3d0de1

Added to database: 9/26/2025, 7:01:16 AM

Last enriched: 10/11/2025, 12:44:56 AM

Last updated: 11/9/2025, 7:32:18 AM

Views: 276

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats