CVE-2025-45466

8.8 HIGH

📋 TL;DR

Unitree Go1 robots with firmware up to Go1_2022_05_11 have hardcoded authentication credentials in plaintext, allowing attackers to bypass authentication and gain unauthorized access. This affects all users of affected Unitree Go1 robot models.

💻 Affected Systems

Products:
  • Unitree Go1 robot
Versions: <= Go1_2022_05_11
Operating Systems: Robot firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable due to hardcoded credentials

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of robot control allowing physical manipulation, data theft, or disabling of safety features

🟠

Likely Case

Unauthorized access to robot systems enabling surveillance, data collection, or limited control functions

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent external connections

🌐 Internet-Facing: HIGH - Hardcoded credentials allow easy authentication bypass if exposed to internet
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to robot but uses publicly known hardcoded credentials

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.unitree.com/cn/go1

Restart Required: Yes

Instructions:

1. Contact Unitree for updated firmware
2. Apply firmware update
3. Change all default credentials
4. Restart robot

🔧 Temporary Workarounds

Network segmentation

all

Isolate robot on separate network segment with strict firewall rules

Credential rotation

all

Manually change hardcoded credentials if firmware allows

🧯 If You Can't Patch

  • Disconnect robot from network when not in use
  • Implement strict network access controls and monitoring

🔍 How to Verify

Check if Vulnerable:

Check firmware version via robot interface or console, verify if <= Go1_2022_05_11

Check Version:

Check robot control interface or manufacturer documentation for version command

Verify Fix Applied:

Verify firmware version > Go1_2022_05_11 and test authentication with default credentials fails

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts with default credentials
  • Unauthorized access patterns

Network Indicators:

  • Connections to robot using known hardcoded credentials
  • Unexpected robot network traffic

SIEM Query:

source_ip=* AND (username="default" OR password="hardcoded_value")

🔗 References

📤 Share & Export