Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.

Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.

Redazione RHC:28 September 2025 18:12

On September 27, 2025, new concerns emerged about robots produced by China’s Unitree Robotics , after serious vulnerabilities were reported that could expose thousands of devices to remote control and malicious use.

According to IEEE Spectrum on Thursday, September 25, researchers have discovered a critical flaw in the Bluetooth Low Energy (BLE) system used by the company’s robots for initial Wi-Fi network setup. This weakness would allow an attacker to gain root privileges on the devices’ Android operating system, gaining complete control over them.

Security researcher Andreas Makris explained that once a robot is compromised, the infection can automatically spread to other Yushu devices within Bluetooth range, turning them into a botnet capable of replicating without human intervention.

The authentication mechanism appears particularly fragile: Unitree robots allow access simply by encrypting a hardcoded string, “unitree.” This allows an attacker to insert arbitrary code disguised as the WiFi network’s SSID and password. When the robot attempts to connect, the code would be executed with administrator privileges, without any additional verification.

Makris added that such an exploit could even prevent users from updating their firmware, leaving devices permanently vulnerable and opening the door to mass takeover. Affected models include the Go2 and B2 quadruped robot dogs and the G1 and H1 humanoid robots . This is the first time a flaw of this magnitude has been publicly disclosed on a commercial humanoid robotics platform.

Researchers contacted Unitree Robotics as early as May 2025, but after several unsuccessful attempts to communicate, the company reportedly stopped responding last July. The lack of cooperation prompted the public disclosure of the vulnerability. Makris also noted that he had previously identified a backdoor in the Yushu Go1 model, raising questions about the origin of these flaws: whether they are the result of negligent development or intentional implementations.

A further report came from Victor Mayoral-Vilches , founder of Alias Robotics, who claimed that Yushu robots are sending telemetry data to Chinese servers, which could include audio, video, and spatial information . Mayoral-Vilches highlighted how these devices are widely used globally, but many users are unaware of the risks associated with their use . While awaiting official responses, the expert advises users to connect the robots only to isolated Wi-Fi networks and to disable Bluetooth connectivity as an immediate protection measure.

The concerns aren’t limited to personal matters. In August 2025, the city of Taipei deployed the Go2 model for urban patrol, raising questions about data security. On May 5, 2025, the U.S. House of Representatives Special Committee on Strategic Competition with China sent a letter to the Secretary of Defense, the Secretary of Commerce, and the Chairman of the Federal Communications Commission, warning that Yushu “poses a growing threat to national security.”

The company’s robots have reportedly already been deployed in sensitive environments such as prisons, police forces, and US military bases. The presence of backdoors and the possibility of remote surveillance have led some observers to call them “Trojan horses with cameras.”

To date, Unitree Robotics has not released any official comment.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli

azaeo.com – datalake

File fishes formats available in:

AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.