POC详情: 21022184d35d36a3ed92505b9343846c7c20a9f3

来源
关联漏洞
标题: Unitree Go1 安全漏洞 (CVE-2025-45467)
描述:Unitree Go1是中国宇树(Unitree)公司的一个仿生四足机器人。 Unitree Go1 Go1_2022_05_11及之前版本存在安全漏洞,该漏洞源于MD5校验机制不足,可能导致固件完整性破坏。
介绍

# CVE-2025-45467: Insecure Firmware Verification in Unitree Go1

## Summary

A critical vulnerability (**CVE-2025-45467**) has been discovered in **Unitree Go1** robotic dog (all firmware versions ≤ `Go1_2022_05_11`), where the **firmware update mechanism** relies solely on **insecure MD5 hash checks** for integrity verification. This allows an attacker to bypass authentication checks and upload **malicious firmware**, leading to **remote code execution**, **privilege escalation**, and **information disclosure**.

---

## Vulnerability Details

- **Vulnerability Type:** Insecure Permissions  
- **Impact:**  
  - Remote Code Execution ✅  
  - Privilege Escalation ✅  
  - Information Disclosure ✅  
- **Attack Type:** Remote (via Wi-Fi AP/client mode or Ethernet)  
- **Component:** `/run.sh` script in official firmware  
- **Verification Method Used:** MD5 checksum only (no signature/authentication)  

---

## Affected Products

- **Vendor:** [Unitree Robotics](https://www.unitree.com/cn/go1)  
- **Product:** Unitree Go1  
- **Affected Versions:** All firmware versions ≤ `Go1_2022_05_11`  
- **Firmware Package:**  
  [Go1_2022_05_11_e0d0e617.zip](https://unitreeapp.oss-cn-beijing.aliyuncs.com/Go1_2022_05_11_e0d0e617.zip)

---

## Proof of Concept (PoC)

1. **Download and extract the official firmware**
   ```bash
   unzip Go1_2022_05_11_e0d0e617.zip
2. **Inspect /run.sh**

3. **The script performs MD5 hash checking, without any form of digital signature or certificate validation.**

4. **Modify the firmware as you want**

5. **Recalculate MD5** of firmware**

6. **Upload the malicious firmware**

7. **Use Wi-Fi (AP/client mode) or Ethernet to push the modified firmware to the robot.**

文件快照

[4.0K] /data/pocs/21022184d35d36a3ed92505b9343846c7c20a9f3 └── [1.7K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。