TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Remote Access Backdoor Discovered in Chinese Robot Dog Unitree Go1

28 点作者 macleginn大约 1 个月前

2 条评论

mmstr大约 1 个月前
From the article:<p>&quot;The discovery of the backdoor was made by cybersecurity specialists Andreas Makris (aka Bin4ry) and Kevin Finisterre (aka d0tslash), who published their findings in a detailed technical report late last week. The duo reverse-engineered firmware and conducted a hands-on analysis of the Unitree Go1 robot dog, revealing that each device ships with a preconfigured tunnel client that initiates a connection to CloudSail — a remote access platform developed by Zhexi Technology, based in China.<p>The researchers demonstrated that upon gaining access to the CloudSail API, which they did using a recovered API key, they could:<p><pre><code> List all connected devices and their IP addresses Establish remote tunnels to those devices Access the robot dog’s web interface with no authentication Use the robot’s cameras for live surveillance Log in via SSH using default credentials (pi&#x2F;123) Move laterally within internal networks to which the robot is connected </code></pre> Makris and Finisterre identified a total of 1,919 unique Unitree Go1 units that had connected to the CloudSail network. While most connections originated from Chinese IP addresses, a significant number were traced to academic and corporate networks abroad. Notable institutions included MIT, Princeton, Carnegie Mellon, and the University of Waterloo, among others. The researchers even observed some units connecting via Starlink, suggesting use in mobile or remote environments.&quot;
评论 #43605503 未加载
bitbasher大约 1 个月前
You could say it was RAB&#x27;D Dog, eh, eh?!<p>I&#x27;ll see myself out.