CVE-2025-35027

HIGH

Unitree G1 Firmware < 1.4.4 - OS Command Injection

Title source: rule
STIX 2.1

Description

Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.

References (6)

Core 6
Core References
Exploit, Third Party Advisory third-party-advisory
https://takeonme.org/cves/cve-2025-35027
Exploit, Technical Description technical-description
https://github.com/Bin4ry/UniPwn
Press/Media Coverage media-coverage
https://spectrum.ieee.org/unitree-robot-exploit
Press/Media Coverage government-resource
https://x.com/committeeonccp/status/1971250635548033311

Scores

CVSS v3 7.3
EPSS 0.0020
EPSS Percentile 42.4%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (4)
unitree/b2_firmware < 1.1.8
unitree/g1_firmware < 1.4.4
unitree/go2_firmware < 1.1.8
unitree/h1_firmware < 1.4.4
Published Sep 26, 2025
Tracked Since Feb 18, 2026