CVE-2025-60017
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-26

Last updated on: 2025-09-26

Assigner: MITRE

Description
Unitree Go2, G1, H1, and B2 devices through 2025-09-20 allow root OS command injection via the hostapd_restart.sh wifi_ssid or wifi_pass parameter (within restart_wifi_ap and restart_wifi_sta).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-26
Last Modified
2025-09-26
Generated
2026-05-07
AI Q&A
2025-09-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
unitree b2 *
unitree g1 *
unitree h1 *
unitree go2 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Unitree Go2, G1, H1, and B2 devices up to September 20, 2025. It allows an attacker to perform root OS command injection through the wifi_ssid or wifi_pass parameters in the hostapd_restart.sh script, specifically within the restart_wifi_ap and restart_wifi_sta functions.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute commands with root privileges on the affected device, potentially leading to full system compromise, unauthorized access, data manipulation, or denial of service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart