CVE-2025-35027
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-78
Neutralización incorrecta de elementos especiales usados en un comando de sistema operativo (Inyección de comando de sistema operativo)
Fecha de publicación:
26/09/2025
Última modificación:
30/09/2025
Descripción
*** Pendiente de traducción *** Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
Impacto
Puntuación base 3.x
7.30
Gravedad 3.x
ALTA
Referencias a soluciones, herramientas e información
- https://github.com/Bin4ry/UniPwn
- https://spectrum.ieee.org/unitree-robot-exploit
- https://takeonme.org/cves/cve-2025-35027
- https://www.cve.org/cverecord?id=CVE-2025-60017
- https://www.cve.org/cverecord?id=CVE-2025-60250
- https://x.com/committeeonccp/status/1971250635548033311
- https://github.com/Bin4ry/UniPwn



