CVE-2025-2894
📋 TL;DR
The Go1 robotic companion contains an undocumented backdoor that allows remote attackers with the correct API key to gain complete control over the device via the CloudSail remote access service. This affects all users of the Go1 robot who haven't implemented specific security controls. The manufacturer and anyone with the API key can remotely operate the robot without user consent.
💻 Affected Systems
- Unitree Go1 (also marketed as 'The World's First Intelligence Bionic Quadruped Robot Companion of Consumer Level')
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete remote takeover of robotic device allowing physical manipulation, surveillance, data theft, or use as a physical threat vector in sensitive environments.
Likely Case
Unauthorized remote access leading to privacy violations, data collection, or disruption of robotic functions.
If Mitigated
Limited impact if network segmentation and access controls prevent external communication with CloudSail service.
🎯 Exploit Status
Exploitation requires possession of the API key, which appears to be hardcoded or predictable. Public research documents exploitation methods.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Monitor Unitree Robotics for security updates and firmware releases.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Go1 robots on separate network segments with strict firewall rules blocking all external CloudSail communication.
Disable CloudSail Service
allIf functionality allows, disable or block the CloudSail remote access service completely.
🧯 If You Can't Patch
- Physically disconnect from networks when not in supervised use
- Implement strict network monitoring for CloudSail-related traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check if device communicates with CloudSail domains or known API endpoints. Monitor for unexpected remote control commands.
Check Version:
Check robot firmware version through manufacturer interface or documentation
Verify Fix Applied:
Verify no unauthorized remote access occurs and CloudSail communication is blocked or disabled.
📡 Detection & Monitoring
Log Indicators:
- Unexpected remote access logs
- CloudSail API authentication attempts
- Unauthorized control commands
Network Indicators:
- Outbound connections to CloudSail domains
- Unexpected inbound control traffic
- API key usage from unauthorized sources
SIEM Query:
Network traffic to/from CloudSail domains OR authentication events with hardcoded API keys
🔗 References
- https://github.com/MAVProxyUser/YushuTechUnitreeGo1/blob/main/Unitree_report.pdf
- https://github.com/unitreerobotics/unitree_ros/issues/120
- https://takeonme.org/cves/cve-2025-2894/
- https://www.axios.com/2025/04/01/threat-spotlight-backdoor-in-chinese-robots-future-of-cybersecurity
- https://x.com/d0tslash/status/1730989109332607208