News Details

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China - Help Net Security

17 Oct, 2025
Humanoid robot found vulnerable to Bluetooth hack, data leaks to China - Help Net Security

Unitree G1 Humanoid Robot Vulnerable to Remote Code Execution

Researchers have identified a critical vulnerability in the Unitree G1 humanoid robot that could allow for remote code execution. The flaw, if exploited, could grant attackers unauthorized access to the robot's systems and potentially enable them to control its functions.

Nature of the Vulnerability

The vulnerability stems from an insecure implementation of the robot's remote control interface. Specifically, a component responsible for handling user input from the remote control application has been found to lack proper validation of received data. This deficiency allows specially crafted commands to be injected, bypassing security checks and leading to the execution of arbitrary code on the robot. The exploit does not require any form of authentication, making it accessible to unauthenticated attackers.

Potential Impact and Mitigation

Successful exploitation of this vulnerability could have severe consequences. An attacker could gain complete control over the Unitree G1 robot, potentially causing it to perform unintended actions, access sensitive data stored on the device, or even be used to compromise other connected systems. While specific details regarding exploitation scenarios were not provided, the potential for malicious manipulation of a physical robot highlights the severity of this finding. At the time of reporting, it is unclear if a patch or mitigation strategy has been released by Unitree. Users of the Unitree G1 robot are advised to remain vigilant for any security advisories or updates from the manufacturer.

In summary, a critical remote code execution vulnerability has been discovered in the Unitree G1 humanoid robot. The flaw allows unauthenticated attackers to inject malicious code by exploiting an insecure remote control interface. This could lead to unauthorized control and potential misuse of the robot.