The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-2894

CVE-2025-2894: Go1 Robot Backdoor RCE Vulnerability

CVE-2025-2894 is a backdoor remote code execution vulnerability in Go1 bionic quadruped robot that allows unauthorized remote control via CloudSail service. This article covers technical details, impact, and mitigations.

Updated: January 22, 2026

CVE-2025-2894 Overview

CVE-2025-2894 is a firmware vulnerability affecting the Unitree Go1 quadruped robot, marketed as "The World's First Intelligence Bionic Quadruped Robot Companion of Consumer Level." The vulnerability involves an undocumented backdoor that enables the manufacturer, and anyone in possession of the correct API key, to gain complete remote control over the affected robotic device using the CloudSail remote access service.

This hidden backdoor represents a significant supply chain security concern, as it provides unauthorized remote access capabilities that were not disclosed to end users. The vulnerability falls under CWE-912 (Hidden Functionality), indicating intentionally concealed features that could be exploited maliciously.

Critical Impact

Any threat actor who obtains the CloudSail API key can remotely access and fully control affected Unitree Go1 robots over the network, potentially enabling surveillance, physical manipulation of the device, or use as a pivot point for further attacks.

Affected Products

  • Unitree Go1 Quadruped Robot (Consumer Level)
  • Devices utilizing the CloudSail remote access service
  • Affected firmware versions with embedded backdoor functionality

Discovery Timeline

  • 2025-03-28 - CVE-2025-2894 published to NVD
  • 2025-04-03 - Last updated in NVD database

Technical Details for CVE-2025-2894

Vulnerability Analysis

The vulnerability centers on an undocumented backdoor embedded within the Unitree Go1 robot's firmware that leverages the CloudSail remote access service. This hidden functionality allows remote parties with knowledge of the correct API key to establish full remote control over the robotic device without the owner's knowledge or consent.

The CloudSail service acts as a tunnel, enabling network-based access to the robot's control systems. Once authenticated with the API key, an attacker gains the ability to manipulate all aspects of the robot's operation, including movement, sensors, cameras, and any connected peripherals.

This represents a classic case of hidden functionality (CWE-912), where the manufacturer has implemented remote access capabilities that were not documented or disclosed to consumers, creating both privacy and security concerns.

Root Cause

The root cause of this vulnerability is the intentional inclusion of undocumented remote access functionality within the Go1 robot's firmware. The backdoor was designed to use the CloudSail service infrastructure, which provides persistent remote connectivity. The manufacturer's decision to implement this capability without user disclosure or consent, combined with insufficient protection of the API key mechanism, creates a significant security exposure.

The API key serves as the sole authentication barrier between potential attackers and full device control. If this key is leaked, reverse-engineered, or otherwise obtained by malicious actors, all deployed Go1 robots become vulnerable to unauthorized remote access.

Attack Vector

The attack leverages network connectivity through the CloudSail remote access service. An attacker who possesses the correct API key can remotely connect to any affected Unitree Go1 robot that has network connectivity. The attack does not require physical access to the device, user interaction, or local authentication.

The exploitation pathway involves:

  1. Obtaining the CloudSail API key through reverse engineering, data breach, or insider access
  2. Identifying target Go1 robots connected to the CloudSail service
  3. Authenticating using the compromised API key
  4. Gaining complete remote control over the robotic device

Detailed technical analysis of the backdoor mechanism is available in the Unitree Technical Report and the associated GitHub ROS issue discussion.

Detection Methods for CVE-2025-2894

Indicators of Compromise

  • Unexpected outbound network connections to CloudSail service infrastructure
  • Unusual network traffic patterns from the Go1 robot to external IP addresses
  • Unexplained robot movement or behavior when not being locally controlled
  • Evidence of API key authentication attempts in network logs

Detection Strategies

  • Monitor network traffic from Go1 robots for connections to CloudSail-associated domains and IP addresses
  • Implement network segmentation to isolate IoT and robotic devices from critical network infrastructure
  • Deploy network intrusion detection systems (NIDS) to identify anomalous traffic patterns from robotic devices
  • Conduct regular firmware analysis to identify undocumented services and network capabilities

Monitoring Recommendations

  • Establish baseline network behavior for Go1 robots and alert on deviations
  • Log all outbound connections from IoT devices and review for unauthorized remote access services
  • Implement DNS monitoring to detect communication with CloudSail infrastructure
  • Consider deploying SentinelOne Singularity for IoT to gain visibility into device behavior and network communications

How to Mitigate CVE-2025-2894

Immediate Actions Required

  • Isolate affected Unitree Go1 robots from network connectivity when not in active use
  • Implement strict firewall rules to block outbound connections to CloudSail service infrastructure
  • Segment IoT and robotic devices onto separate network VLANs with restricted internet access
  • Contact Unitree Robotics for guidance on disabling the CloudSail backdoor functionality

Patch Information

At the time of publication, no official patch has been released by Unitree Robotics to address this undocumented backdoor. Organizations and consumers should monitor the GitHub Unitree ROS repository and vendor communications for updates regarding firmware modifications that may remove or secure the CloudSail remote access functionality.

Additional technical details and community discussions are available through the TakeOnMe CVE-2025-2894 advisory and related security coverage.

Workarounds

  • Disable or block network connectivity for Go1 robots when remote access is not required
  • Configure perimeter firewalls to deny outbound connections from robotic devices to unknown external services
  • Implement network-level monitoring and alerting for any CloudSail service communications
  • Consider physical disconnection of network interfaces if the device can operate in offline mode
  • Evaluate replacement with alternative robotic platforms that do not contain undocumented remote access functionality
bash
# Example firewall rule to block CloudSail service (adjust IPs based on your analysis)
# Block outbound connections from Go1 robot subnet to CloudSail infrastructure
iptables -A OUTPUT -s 192.168.1.0/24 -d <CloudSail_IP_Range> -j DROP

# Alternative: Restrict Go1 robots to local network only
iptables -A FORWARD -s <Go1_Robot_IP> -d 0.0.0.0/0 -j DROP
iptables -A FORWARD -s <Go1_Robot_IP> -d 192.168.0.0/16 -j ACCEPT

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechGo1

  • SeverityMEDIUM

  • CVSS Score6.6

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-912
  • Technical References
  • GitHub Unitree Technical Report

  • GitHub Unitree ROS Issue

  • TakeOnMe CVE-2025-2894

  • Axios Threat Spotlight Article

  • X.com Security Update
  • Latest CVEs
  • CVE-2026-40322: SiYuan Knowledge Management RCE Vulnerability

  • CVE-2026-40318: SiYuan Path Traversal Vulnerability

  • CVE-2026-40259: SiYuan Auth Bypass Vulnerability

  • CVE-2026-40255: AdonisJS HTTP Server CSRF Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English