Description
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
References (6)
Core 6
Core References
Exploit, Third Party Advisory third-party-advisory
https://takeonme.org/cves/cve-2025-35027
Exploit, Technical Description technical-description
https://github.com/Bin4ry/UniPwn
Press/Media Coverage media-coverage
https://spectrum.ieee.org/unitree-robot-exploit
Press/Media Coverage government-resource
https://x.com/committeeonccp/status/1971250635548033311
Third Party Advisory related
https://www.cve.org/cverecord?id=CVE-2025-60017
Third Party Advisory related
https://www.cve.org/cverecord?id=CVE-2025-60250
Scores
CVSS v3
7.3
EPSS
0.0020
EPSS Percentile
42.4%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (4)
unitree/b2_firmware
< 1.1.8
unitree/g1_firmware
< 1.4.4
unitree/go2_firmware
< 1.1.8
unitree/h1_firmware
< 1.4.4
Published
Sep 26, 2025
Tracked Since
Feb 18, 2026