Unitree人形机器人安全漏洞:全面攻击面分析与远程入侵技术研究
文章探讨了Unitree人形机器人潜在的安全威胁与漏洞。研究者分析了硬件接口、近距离无线电及互联网通道等攻击面,并展示了通过蓝牙、LoRa及Wi-Fi漏洞劫持机器人的方法。此外,他们利用语音或文本命令破解机器人AI代理,实现远程代码执行并完全控制机器人。研究强调了网络化AI人形机器人的安全风险,并呼吁在设计中加入安全措施以应对未来挑战。 2025-12-26 16:48:0 Author: events.ccc.de(查看原文) 阅读量:10 收藏

Unitree is among the highest-volume makers of commercial robots, and their newest humanoid platforms ship with multiple control stacks and on-device AI agents. If the widespread, intrusive presence of these robots in our lives is inevitable, should we take the initiative to ensure they are completely under our control? What paths might attackers use to compromise these robots, and to what extent could they threaten the physical world?

In this talk, we first map the complete attack surface of Unitree humanoids, covering hardware interfaces, near-field radios and Internet-accessible channels. We demonstrate how a local attacker can hijack a robot by exploiting vulnerabilities in short-range radio communications (Bluetooth, LoRa) and local Wi-Fi. We also present a fun exploit of the embodied AI in the humanoid: With a single spoken/text sentence, we jailbreak the on-device LLM Agent and pivot to root-priviledged remote code execution. Combined with a flaw in the cloud management service, this forms a full path to gain complete control over any Unitree robot connected to the Internet, obtaining root shell, camera livestreaming, and speaker control.

To achieve this, we combined hardware inspection, firmware extraction, software-defined radio tooling, and deobfuscation of customized, VM-based protected binaries. This reverse engineering breakthrough also allowed us to understand the overall control logic, patch decision points, and unlock advanced robotic movements that were deliberately disabled on consumer models like G1 AIR.

Takeaways. Modern humanoids are networked, AI-powered cyber-physical systems; weaknesses across radios, cloud services, and on-device agents could allow attackers to remotely hijack robot operations, extract sensitive data or camera livestreams, or even weaponize the physical capabilities. As robotics continue their transition from controlled environments to everyday applications, our work highlights the urgent need for security-by-design in this emerging technology landscape.


文章来源: https://events.ccc.de/congress/2025/hub/en/event/detail/skynet-starter-kit-from-embodied-ai-jailbreak-to-remote-takeover-of-humanoid-robots
如有侵权请联系:admin#unsafe.sh