Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unitree
Unitree go2 Unitree go2 Edu Unitree go2 Edu Firmware Unitree go2 Firmware |
|
| CPEs | cpe:2.3:h:unitree:go2:-:*:*:*:*:*:*:* cpe:2.3:h:unitree:go2_edu:-:*:*:*:*:*:*:* cpe:2.3:o:unitree:go2_edu_firmware:1.1.11:*:*:*:*:*:*:* cpe:2.3:o:unitree:go2_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Unitree
Unitree go2 Unitree go2 Edu Unitree go2 Edu Firmware Unitree go2 Firmware |
Fri, 27 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 27 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unitreerobotics
Unitreerobotics unitree Go2 |
|
| Vendors & Products |
Unitreerobotics
Unitreerobotics unitree Go2 |
Thu, 26 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, unauthenticated attacker can join DDS domain 0 and publish a crafted message (api_id=1002) containing arbitrary Python, which the robot writes to disk under /unitree/etc/programming/ and binds to a physical controller keybinding. When the keybinding is pressed, the code executes as root and the binding persists across reboots. | |
| Title | Unitree Go2 Missing DDS Authentication Enables Adjacent RCE | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-27T18:15:37.037Z
Reserved: 2026-02-19T19:51:07.327Z
Link: CVE-2026-27509
Updated: 2026-02-27T17:53:43.111Z
Status : Analyzed
Published: 2026-02-26T20:31:38.447
Modified: 2026-03-12T20:17:02.667
Link: CVE-2026-27509
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:07:10Z