CVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
AI Analysis
Technical Summary
CVE-2025-35027 is an OS command injection vulnerability categorized under CWE-78 that affects multiple robotic products from Unitree Robotics, including the Go2 quadruped robot, G1 humanoid, H1, and B2 models. These devices share a common firmware codebase derived from the MIT Cheetah project, with two major forks for different robot types. The vulnerability is triggered when an attacker sets a maliciously crafted string during the configuration of the on-board WiFi via the robot's Bluetooth Low Energy (BLE) module. This malicious input is not properly sanitized or neutralized before being passed to the wpa_supplicant_restart.sh shell script, which is responsible for restarting the WiFi service. When the WiFi service is restarted, the injected commands execute with root privileges, enabling full system compromise. The attack vector requires an attacker to have low-level privileges (PR:L) and network access (AV:A), but no user interaction is needed (UI:N). The vulnerability was published on September 26, 2025, with a CVSS v3.1 score of 7.3, indicating high severity. No public exploits are known at this time, but the potential impact includes unauthorized command execution, data confidentiality breaches, and integrity violations. The vulnerability affects all versions of the firmware as indicated, and no patches have been linked yet. The root cause is improper input validation and neutralization of special characters in the WiFi configuration process, a critical oversight given the privileged execution context of the restart script.
Potential Impact
For European organizations deploying Unitree robotic products, this vulnerability poses a significant risk to operational security and data confidentiality. Robots used in industrial automation, research labs, logistics, or security patrols could be commandeered by attackers to execute arbitrary commands as root, potentially leading to data theft, sabotage, or disruption of critical robotic functions. The ability to execute commands at root level without user interaction increases the risk of stealthy persistent attacks. Compromise of these robots could also serve as a pivot point for lateral movement within enterprise networks, especially in environments where robots are integrated with other critical systems. The impact on availability is less direct but could occur if attackers disable WiFi or robot functions. Given the growing adoption of robotics in European manufacturing and research sectors, the threat could affect sensitive intellectual property and operational continuity. The lack of known exploits currently provides a window for mitigation, but the vulnerability’s nature suggests it could be weaponized quickly once exploited in the wild.
Mitigation Recommendations
1. Immediately restrict BLE module access to trusted devices only, using strong authentication and encryption to prevent unauthorized WiFi configuration attempts. 2. Implement strict input validation and sanitization on all WiFi configuration parameters, especially those received via BLE, to neutralize special characters that could lead to command injection. 3. Monitor and log all WiFi configuration changes and service restarts to detect anomalous or unauthorized activities. 4. Isolate robotic devices on segmented networks with limited access to critical infrastructure to reduce attack surface and lateral movement risk. 5. Deploy host-based intrusion detection systems (HIDS) on robots if supported, to detect suspicious command executions. 6. Coordinate with Unitree Robotics for timely firmware updates and apply patches as soon as they become available. 7. Conduct security audits and penetration testing focused on BLE interfaces and WiFi configuration mechanisms. 8. Educate operational staff on the risks of BLE-based configuration and enforce strict operational security policies around robot management.
Affected Countries
Germany, France, Netherlands, Sweden, United Kingdom, Italy
CVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
Description
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
AI-Powered Analysis
Technical Analysis
CVE-2025-35027 is an OS command injection vulnerability categorized under CWE-78 that affects multiple robotic products from Unitree Robotics, including the Go2 quadruped robot, G1 humanoid, H1, and B2 models. These devices share a common firmware codebase derived from the MIT Cheetah project, with two major forks for different robot types. The vulnerability is triggered when an attacker sets a maliciously crafted string during the configuration of the on-board WiFi via the robot's Bluetooth Low Energy (BLE) module. This malicious input is not properly sanitized or neutralized before being passed to the wpa_supplicant_restart.sh shell script, which is responsible for restarting the WiFi service. When the WiFi service is restarted, the injected commands execute with root privileges, enabling full system compromise. The attack vector requires an attacker to have low-level privileges (PR:L) and network access (AV:A), but no user interaction is needed (UI:N). The vulnerability was published on September 26, 2025, with a CVSS v3.1 score of 7.3, indicating high severity. No public exploits are known at this time, but the potential impact includes unauthorized command execution, data confidentiality breaches, and integrity violations. The vulnerability affects all versions of the firmware as indicated, and no patches have been linked yet. The root cause is improper input validation and neutralization of special characters in the WiFi configuration process, a critical oversight given the privileged execution context of the restart script.
Potential Impact
For European organizations deploying Unitree robotic products, this vulnerability poses a significant risk to operational security and data confidentiality. Robots used in industrial automation, research labs, logistics, or security patrols could be commandeered by attackers to execute arbitrary commands as root, potentially leading to data theft, sabotage, or disruption of critical robotic functions. The ability to execute commands at root level without user interaction increases the risk of stealthy persistent attacks. Compromise of these robots could also serve as a pivot point for lateral movement within enterprise networks, especially in environments where robots are integrated with other critical systems. The impact on availability is less direct but could occur if attackers disable WiFi or robot functions. Given the growing adoption of robotics in European manufacturing and research sectors, the threat could affect sensitive intellectual property and operational continuity. The lack of known exploits currently provides a window for mitigation, but the vulnerability’s nature suggests it could be weaponized quickly once exploited in the wild.
Mitigation Recommendations
1. Immediately restrict BLE module access to trusted devices only, using strong authentication and encryption to prevent unauthorized WiFi configuration attempts. 2. Implement strict input validation and sanitization on all WiFi configuration parameters, especially those received via BLE, to neutralize special characters that could lead to command injection. 3. Monitor and log all WiFi configuration changes and service restarts to detect anomalous or unauthorized activities. 4. Isolate robotic devices on segmented networks with limited access to critical infrastructure to reduce attack surface and lateral movement risk. 5. Deploy host-based intrusion detection systems (HIDS) on robots if supported, to detect suspicious command executions. 6. Coordinate with Unitree Robotics for timely firmware updates and apply patches as soon as they become available. 7. Conduct security audits and penetration testing focused on BLE interfaces and WiFi configuration mechanisms. 8. Educate operational staff on the risks of BLE-based configuration and enforce strict operational security policies around robot management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AHA
- Date Reserved
- 2025-04-15T20:41:31.524Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d63a3cd03b6389fc3d0de1
Added to database: 9/26/2025, 7:01:16 AM
Last enriched: 10/11/2025, 12:44:56 AM
Last updated: 11/9/2025, 7:32:18 AM
Views: 276
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12916: Command Injection in Sangfor Operation and Maintenance Security Management System
MediumCVE-2025-12915: File Inclusion in 70mai X200
HighCVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumCVE-2025-12913: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-12837: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub aThemes Addons for Elementor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.