CVE-2026-27510

CRITICAL
2026-02-26 [email protected]
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:56 vuln.today
PoC Detected
Mar 12, 2026 - 20:03 vuln.today
Public exploit code
CVE Published
Feb 26, 2026 - 20:31 nvd
CRITICAL 9.6

Description

Unitree Go2 firmware versions 1.1.7 through 1.1.11, when used with the Unitree Go2 Android application (com.unitree.doggo2), are vulnerable to remote code execution due to missing integrity protection and validation of user-created programmes. The Android application stores programs in a local SQLite database (unitree_go2.db, table dog_programme) and transmits the programme_text content, including the pyCode field, to the robot. The robot's actuator_manager.py executes the supplied Python as root without integrity verification or content validation. An attacker with local access to the Android device can tamper with the stored programme record to inject arbitrary Python that executes when the user triggers the program via a controller keybinding, and the malicious binding persists across reboots. Additionally, a malicious program shared through the application's community marketplace can result in arbitrary code execution on any robot that imports and runs it.

Analysis

Remote control vulnerability in Unitree Go2 robot dog firmware 1.1.7-1.1.11. The companion Android app allows remote attackers to take control of the robot. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Unitree Go2 robots and identify affected firmware versions; disconnect affected units from networks or disable remote program execution features if operationally feasible. Within 7 days: Contact Unitree for patch timeline; implement network segmentation to restrict robot communication to trusted administrative networks only. …

Sign in for detailed remediation steps.

Priority Score

68
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +48
POC: +20

Share

CVE-2026-27510 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy