Impact
Based on the description, it is inferred that the vulnerability arises from a hard‑coded key used in the encryption of Unitree firmware update files, allowing an attacker with access to the key material to alter firmware packages. This flaw permits the delivery of malicious firmware to affected units, potentially leading to unauthorized code execution or other malicious behavior once the firmware is installed. The weakness is rooted in key management practices and is captured as CWE‑321.
Affected Systems
All current Unitree robotic models, including the Go1 Air, Go1 Pro, Go2 Air, Go2 Edu Plus, Go2 Edu Standard, Go2 Pro, Go2 X, and their respective firmware versions, are impacted because the issue stems from the firmware generation and extraction processes across the product line.
Risk and Exploitability
The CVSS score is 7.8, indicating high severity, while the EPSS score is below 1%, suggesting a very low but nonzero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector involves access to the update distribution mechanism or a network path that allows delivery of a crafted firmware; the official description notes that no publicly documented method exists yet to inject poisoned firmware without the owner’s knowledge, implying that successful exploitation may require elevated access or sophisticated intrusion techniques.
OpenCVE Enrichment