Firmware Update Vulnerability in Unitree Robotics Products
CVE-2026-1442

7.8HIGH

Key Information:

Vendor

Unitree

Status
Vendor
CVE Published:
27 February 2026

Badges

πŸ“ˆ Score: 181πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2026-1442?

CVE-2026-1442 is a significant vulnerability in Unitree Robotics products, particularly impacting devices like the Unitree Go2 and potentially all models available as of February 26, 2026. This vulnerability arises from the use of a compromised encryption algorithm for firmware updates, which can be exploited by unauthorized individuals. Due to the availability of key material to attackers, the integrity of firmware updates is at risk; unauthorized users could alter these updates, introducing malicious code without the knowledge of device owners. This situation presents serious concerns as compromised firmware could lead to unauthorized control of robotics products, jeopardizing functionality and security.

Potential impact of CVE-2026-1442

  1. Unauthorized Control: Malicious actors can gain control over affected robotics devices by injecting modified firmware, leading to unauthorized use or manipulation of the equipment.

  2. Integrity Loss: The alteration of firmware could cause devices to operate incorrectly or be rendered inoperable, affecting operational efficacy and safety in environments where these robots are used.

  3. Security Breaches: The ability to exploit this vulnerability may pave the way for broader security risks, as compromised devices could serve as entry points for additional attacks on connected networks or systems, amplifying the potential for data breaches or infrastructure disruptions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

UPK 0 <= 20260226v1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Andreas Makris aka Bin4ry
todb
.