CVE-2026-27509
Received Received - Intake
Remote Code Execution via DDS Injection in Unitree Go2 Firmware

Publication date: 2026-02-26

Last updated on: 2026-03-12

Assigner: VulnCheck

Description
Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, unauthenticated attacker can join DDS domain 0 and publish a crafted message (api_id=1002) containing arbitrary Python, which the robot writes to disk under /unitree/etc/programming/ and binds to a physical controller keybinding. When the keybinding is pressed, the code executes as root and the binding persists across reboots.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-26
Last Modified
2026-03-12
Generated
2026-05-07
AI Q&A
2026-02-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
unitree go2_firmware From 1.1.7 (inc) to 1.1.9 (inc)
unitree go2_edu_firmware 1.1.11
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27509 affects Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU). The vulnerability exists because the firmware does not implement authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request, which is managed by the actuator_manager.py script.

This flaw allows a network-adjacent, unauthenticated attacker to join DDS domain 0 and publish a specially crafted message containing arbitrary Python code. The robot writes this code to disk under /unitree/etc/programming/ and binds it to a physical controller keybinding.

When the keybinding is pressed, the malicious code executes with root privileges, and this binding remains persistent across system reboots.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability allows an attacker who is adjacent on the network to execute arbitrary Python code on the Unitree Go2 robot with root privileges.'}, {'type': 'paragraph', 'content': 'The attacker can persistently bind malicious code to a physical controller keybinding, enabling remote code execution triggered by pressing a physical button.'}, {'type': 'paragraph', 'content': "The impact includes full compromise of the robot's confidentiality, integrity, and availability, as the attacker can run any code as root and maintain persistence across reboots."}] [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring the DDS (Data Distribution Service) traffic on your network, specifically looking for activity on the Eclipse CycloneDDS topic `rt/api/programming_actuator/request`.'}, {'type': 'paragraph', 'content': "You can use network analysis tools such as Wireshark or tcpdump to capture and inspect DDS multicast and unicast UDP traffic on the robot's internal network interface (typically eth0)."}, {'type': 'list_item', 'content': 'Use tcpdump to capture DDS traffic on the internal interface: tcpdump -i eth0 udp port 7400'}, {'type': 'list_item', 'content': 'Filter for DDS topic messages related to `rt/api/programming_actuator/request` by inspecting the payloads for JSON-encoded messages with `api_id=1002`.'}, {'type': 'list_item', 'content': 'Check the filesystem on the robot for unexpected files under `/unitree/etc/programming/` which may indicate malicious code written by an attacker.'}, {'type': 'paragraph', 'content': 'Additionally, review physical controller keybindings for any unexpected or persistent bindings that could trigger execution of arbitrary code.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "Immediate mitigation steps include isolating the robot's internal network to prevent unauthorized devices from joining the DDS domain 0 network."}, {'type': 'paragraph', 'content': "Ensure that the robot's internal network interface (eth0) is not accessible from untrusted networks or external interfaces (such as wlan0)."}, {'type': 'list_item', 'content': 'Implement network segmentation and firewall rules to block access to DDS multicast and unicast UDP ports (typically port 7400) from untrusted sources.'}, {'type': 'list_item', 'content': 'Monitor and audit the `/unitree/etc/programming/` directory for unauthorized files and remove any suspicious scripts.'}, {'type': 'list_item', 'content': 'Reset or reconfigure physical controller keybindings to remove any malicious bindings.'}, {'type': 'paragraph', 'content': 'Long-term mitigation requires applying patches from Unitree Robotics once available and enabling DDS authentication and authorization mechanisms.'}] [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart