CVE-2026-27509: CWE-306 Missing Authentication for Critical Function in UnitreeRobotics Unitree Go2
Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, unauthenticated attacker can join DDS domain 0 and publish a crafted message (api_id=1002) containing arbitrary Python, which the robot writes to disk under /unitree/etc/programming/ and binds to a physical controller keybinding. When the keybinding is pressed, the code executes as root and the binding persists across reboots.
AI Analysis
Technical Summary
CVE-2026-27509 is a critical vulnerability in the Unitree Go2 robot firmware versions 1.1.7 through 1.1.9 and 1.1.11 EDU, caused by missing authentication and authorization controls in the DDS (Data Distribution Service) communication layer. Specifically, the Eclipse CycloneDDS topic rt/api/programming_actuator/request, handled by actuator_manager.py, lacks DDS security mechanisms, allowing any network-adjacent attacker to join DDS domain 0 without credentials. The attacker can publish a specially crafted message with api_id=1002 containing arbitrary Python code. The robot writes this code to disk at /unitree/etc/programming/ and binds it to a physical controller keybinding. When the user presses the corresponding key, the malicious code executes with root privileges, enabling full system compromise. This binding persists across reboots, ensuring long-term control. The vulnerability requires no prior authentication but does require physical interaction (key press) to trigger code execution. The flaw exposes critical functions to unauthorized control, violating CWE-306 (Missing Authentication for Critical Function). Although no public exploits are reported, the ease of injecting code and root-level execution makes this a severe threat to the integrity and availability of the robot's control systems. The vulnerability affects the confidentiality of the system by allowing arbitrary code execution and potential data exfiltration or sabotage. The lack of DDS authentication is a fundamental security oversight in the robot's firmware communication design.
Potential Impact
The impact of CVE-2026-27509 is significant for organizations deploying Unitree Go2 robots, especially in industrial, research, and educational environments. Successful exploitation allows attackers to execute arbitrary code as root, leading to full system compromise, potential espionage, sabotage, or physical harm if the robot is used in sensitive or hazardous operations. The persistence of the malicious binding across reboots increases the risk of long-term undetected control. Confidentiality is compromised as attackers can access sensitive data or control functions. Integrity is severely impacted since attackers can alter robot behavior or firmware. Availability may be disrupted by malicious commands or denial-of-service conditions. The requirement for network adjacency means attackers must be on the same network or have access to the DDS domain, which may be feasible in poorly segmented or exposed environments. The need for user interaction (key press) slightly reduces risk but does not eliminate it, especially in automated or unattended scenarios. Overall, the vulnerability poses a high risk to operational safety, data security, and trustworthiness of robotic systems.
Mitigation Recommendations
To mitigate CVE-2026-27509, organizations should prioritize the following actions: 1) Apply firmware updates from UnitreeRobotics once available that implement proper DDS authentication and authorization controls for critical topics. 2) Until patches are released, isolate Unitree Go2 robots on segmented, trusted networks with strict access controls to prevent unauthorized DDS domain access. 3) Disable or restrict physical controller keybindings that can execute arbitrary code, or monitor and audit keybinding configurations regularly. 4) Employ network monitoring to detect unusual DDS traffic or unauthorized domain joins. 5) Implement strict physical security controls to prevent unauthorized personnel from interacting with robot controllers. 6) Use host-based intrusion detection to monitor filesystem changes in /unitree/etc/programming/ and alert on unexpected code additions. 7) Educate operators about the risks of pressing controller keys without verifying the robot’s state. These measures go beyond generic advice by focusing on network segmentation, physical security, and monitoring specific to the vulnerability’s exploitation vector.
Affected Countries
United States, China, Germany, Japan, South Korea, France, United Kingdom, Canada, Singapore, Switzerland, Netherlands
CVE-2026-27509: CWE-306 Missing Authentication for Critical Function in UnitreeRobotics Unitree Go2
Description
Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, unauthenticated attacker can join DDS domain 0 and publish a crafted message (api_id=1002) containing arbitrary Python, which the robot writes to disk under /unitree/etc/programming/ and binds to a physical controller keybinding. When the keybinding is pressed, the code executes as root and the binding persists across reboots.
AI-Powered Analysis
Technical Analysis
CVE-2026-27509 is a critical vulnerability in the Unitree Go2 robot firmware versions 1.1.7 through 1.1.9 and 1.1.11 EDU, caused by missing authentication and authorization controls in the DDS (Data Distribution Service) communication layer. Specifically, the Eclipse CycloneDDS topic rt/api/programming_actuator/request, handled by actuator_manager.py, lacks DDS security mechanisms, allowing any network-adjacent attacker to join DDS domain 0 without credentials. The attacker can publish a specially crafted message with api_id=1002 containing arbitrary Python code. The robot writes this code to disk at /unitree/etc/programming/ and binds it to a physical controller keybinding. When the user presses the corresponding key, the malicious code executes with root privileges, enabling full system compromise. This binding persists across reboots, ensuring long-term control. The vulnerability requires no prior authentication but does require physical interaction (key press) to trigger code execution. The flaw exposes critical functions to unauthorized control, violating CWE-306 (Missing Authentication for Critical Function). Although no public exploits are reported, the ease of injecting code and root-level execution makes this a severe threat to the integrity and availability of the robot's control systems. The vulnerability affects the confidentiality of the system by allowing arbitrary code execution and potential data exfiltration or sabotage. The lack of DDS authentication is a fundamental security oversight in the robot's firmware communication design.
Potential Impact
The impact of CVE-2026-27509 is significant for organizations deploying Unitree Go2 robots, especially in industrial, research, and educational environments. Successful exploitation allows attackers to execute arbitrary code as root, leading to full system compromise, potential espionage, sabotage, or physical harm if the robot is used in sensitive or hazardous operations. The persistence of the malicious binding across reboots increases the risk of long-term undetected control. Confidentiality is compromised as attackers can access sensitive data or control functions. Integrity is severely impacted since attackers can alter robot behavior or firmware. Availability may be disrupted by malicious commands or denial-of-service conditions. The requirement for network adjacency means attackers must be on the same network or have access to the DDS domain, which may be feasible in poorly segmented or exposed environments. The need for user interaction (key press) slightly reduces risk but does not eliminate it, especially in automated or unattended scenarios. Overall, the vulnerability poses a high risk to operational safety, data security, and trustworthiness of robotic systems.
Mitigation Recommendations
To mitigate CVE-2026-27509, organizations should prioritize the following actions: 1) Apply firmware updates from UnitreeRobotics once available that implement proper DDS authentication and authorization controls for critical topics. 2) Until patches are released, isolate Unitree Go2 robots on segmented, trusted networks with strict access controls to prevent unauthorized DDS domain access. 3) Disable or restrict physical controller keybindings that can execute arbitrary code, or monitor and audit keybinding configurations regularly. 4) Employ network monitoring to detect unusual DDS traffic or unauthorized domain joins. 5) Implement strict physical security controls to prevent unauthorized personnel from interacting with robot controllers. 6) Use host-based intrusion detection to monitor filesystem changes in /unitree/etc/programming/ and alert on unexpected code additions. 7) Educate operators about the risks of pressing controller keys without verifying the robot’s state. These measures go beyond generic advice by focusing on network segmentation, physical security, and monitoring specific to the vulnerability’s exploitation vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-19T19:51:07.327Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61ab6
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:49:12 PM
Last updated: 2/27/2026, 1:57:26 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3274: Buffer Overflow in Tenda F453
HighCVE-2026-3037: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25721: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25196: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25105: CWE-78 in Copeland Copeland XWEB 300D PRO
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.