Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-45466 PoC — Unitree Go1 安全漏洞

Source
Associated Vulnerability
Title:Unitree Go1 安全漏洞 (CVE-2025-45466)
Description:Unitree Go1是中国宇树(Unitree)公司的一个仿生四足机器人。 Unitree Go1 Go1_2022_05_11及之前版本存在安全漏洞,该漏洞源于硬编码凭据,可能导致访问控制不当。
Description
It is the details of CVE-2025-45466
Readme
# CVE-2025-45466
It is the details of CVE-2025-45466

# CVE Disclosure: CVE-2025-45466  

## Summary

A vulnerability has been discovered in **Unitree Go1** robotic dog (all versions <= `Go1_2022_05_11`) involving **hardcoded plaintext authentication credentials**, which leads to **Incorrect Access Control**. This issue allows remote or local attackers to gain unauthorized access to the system via SSH or SCP, potentially resulting in **remote code execution**, **privilege escalation**, and **information disclosure**.

---

## Vulnerability Details

- **Vulnerability Type:** Incorrect Access Control  
- **Impact:**  
  - Remote Code Execution ✅  
  - Privilege Escalation ✅  
  - Information Disclosure ✅  
- **Attack Vector:**  
  An attacker can extract the firmware, inspect a specific script (`/run.sh`), and find hardcoded plaintext credentials used for SSH/SCP authentication. With these credentials, the attacker can access the robot remotely via:
    - **Wi-Fi client mode**  
    - **Wi-Fi AP mode**  
    - **Physical access via Ethernet interface**

---

## Affected Products

- **Vendor:** [Unitree Robotics](https://www.unitree.com/cn/go1)  
- **Product:** Unitree Go1  
- **Affected Versions:** All firmware versions ≤ `Go1_2022_05_11`  
- **Affected Component:** `/run.sh` in the firmware  
- **Firmware Package URL (Archived):**  
  [Go1_2022_05_11_e0d0e617.zip](https://unitreeapp.oss-cn-beijing.aliyuncs.com/Go1_2022_05_11_e0d0e617.zip)

---

## Proof of Concept (PoC)

1. **Download the affected firmware**  
2. grep -i "password" run.sh
3. ssh root@<robot_ip> # using the hardcoded password
4. Do anything you want with root permission.

## Result
As the screenshot shows below, the password of root access is saved in passwd.sh(figure 1). And this file can be identified in the same package(figure 2)

figure 1:
![image](https://github.com/user-attachments/assets/d29c749f-13f1-4aca-92e3-c13654b8d4e3)

figure 2:
![image](https://github.com/user-attachments/assets/08cd9f4d-f95f-41cf-a8a3-64011fd87626)



File Snapshot

[4.0K] /data/pocs/1fb923d30dee0ac76c67107ee7b50ab40da2a8cb └── [2.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.