homehome Home chatchat Notifications


These Robot Dogs Kept Going Viral on Social Media — Turns Out, They Have a Spying Backdoor

It looks like a futuristic pet, but the Unitree Go1 robot dog came with a silent stowaway.

Mihai Andrei
April 7, 2025 @ 11:09 pm

share Share

Two cybersecurity researchers have now revealed that the China-based manufacturer Unitree Robotics pre-installed an undocumented remote access backdoor into every Go1 robot. Their investigation uncovered how anyone, could potentially tap into these robots — viewing camera feeds, locating devices in real time, and even seizing full control without permission.

This isn’t just a slight security oversight. It’s a major security risk in a widely sold consumer robot. The report doesn’t claim whether this was intentional or just bad design.

colorful image caricature of unitree go1 robot with a backdoor
Cute, capable, and backdoored. AI-edited image.

The vulnerability has now been formally documented under CVE-2025-2894, labeled a critical security flaw in the Common Vulnerabilities and Exposures listing. At its heart lies a tunnel client embedded in the Go1’s operating system, quietly connecting to a third-party platform named CloudSail, developed by a Chinese firm called Zhexi Technology.

Unitree Go1

The sleek, four-legged Unitree Go1 robot dog was marketed as a futuristic companion for researchers, educators, and tech enthusiasts. But beneath its metallic skin, it has more than clever actuators. It has a backdoor that outsiders can tap into.

According to researchers Andreas Makris and Kevin Finisterre, who conducted an exhaustive teardown of the robot, this backdoor would auto-start on boot if internet connectivity was available.

Once connected to the internet, the Go1 robot would automatically establish a link with CloudSail. This tunnel client granted remote operators the ability to:

  • List connected devices and their IP addresses;
  • Initiate connections back into users’ private networks;
  • Access the robot’s live camera feed with no login;
  • Control the robot’s movement using default credentials;
  • Move laterally across internal systems.
Image from the report.

In total, the team identified 1,919 unique Go1 robots that had accessed the CloudSail network. While many came from China, others traced to networks in North America and Europe, including high-profile institutions such as MIT, Princeton, Carnegie Mellon, and the University of Waterloo. Some units even used Starlink, suggesting deployments in mobile or remote settings.

Unitree is a hype company

If you read the news and browse social media, the odds are you’ve seen at least one Unitree robot. We’ve covered them as well. They have an impressive array of humanoid robots that can do Kung Fu and backflips as well as a couple dog-type robots. Furthermore, Unitree was one of the leading companies who signed a pledge against weaponizing robots, along with Boston Dynamics.

The Unitree Go1, sold in Air ($2,500), Pro ($3,500), and Edu ($8,500) versions, shares the same software architecture across models. And it’s widely used — by students, researchers, corporate labs, and even defense contractors experimenting with robotic mobility. Its robots often go viral on social media and it seems to have a bright future ahead.

That’s what makes this kind of vulnerability so dangerous.

Unitree responded to the claims by asserting that the issue stemmed from hackers who “illegally obtained the management key of the third-party cloud tunnel service” and “used it to modify data and programs within the user’s machine with high-level permission.” The company also said that newer models, like the Go2 and humanoid robots, are unaffected by this issue.

Still, the company admitted that remote tunnel features like this are “common” in the robotics industry — a statement that is concerning considering how popular robots are becoming. Even if the tunnel was never exploited, its very existence is unacceptable in consumer and research devices. Whether this was an intentional backdoor or — as Makris told Axios — “sloppy architecture, sloppy programming,” remains uncertain. But it raises a big alarm.

As is often the case, the smarter our devices, the more the risk of security breaches increase. So, without strict oversight, transparency, and built-in protections, the smart machines meant to serve us could quietly become tools for intrusion.

share Share

New DNA Evidence Reveals What Actually Killed Napoleon’s Grand Army in 1812

Napoleon's army was the largest Europe had ever seen, but in just a few months it was obliterated.

Breathing This Common Air Pollution May Raise Your Dementia Risk by 17 Percent

Long-term exposure to common air pollutants like soot and traffic fumes may significantly raise your risk of dementia.

This mRNA HIV Vaccine Produces the Virus-Fighting Antibodies That Have Eluded Researchers for 40 Years

New mRNA-based HIV vaccines spark hope with potent immune responses in first human trial

Aging Might Travel Through Your Blood and This Protein Is Behind It

Researchers identify a molecular “messenger” that spreads cellular aging between organs.

Older Adults Keep Their Brains up to Two Years 'Younger' Thanks to This Cognitive Health Program

Structured programs showed greater cognitive gains, but even modest lifestyle changes helped.

Ancient Human Ancestors Showed Extreme Size Differences Between Males and Females

Early human ancestors may have lived in societies more combative than anything today.

Anthropic says it's "vaccinating" its AI with evil data to make it less evil

The Black Mirror episodes are writing themselves now.

Optimists Are All the Same; Pessimists Are All Different

Researchers found the brain activity of optimists looked strikingly similar to that of other optimists.

This Unbelievable Take on the Double Slit Experiment Just Proved Einstein Wrong Again

MIT experiment shows even minimal disturbance erases light’s wave pattern, proving Einstein wrong

Ohio Couple Welcomes World's “Oldest Baby” From 30-Year-Old Frozen Embryo

A record-breaking birth brings new questions about the limits of life in cold storage