{"uuid": "f3249b60-614b-4b73-a815-db26e9452cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2894", "type": "seen", "source": "https://t.me/cvedetector/21362", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2894 - Go1 Unauthenticated Remote Command Execution Backdoor\", \n  \"Content\": \"CVE ID : CVE-2025-2894 \nPublished : March 28, 2025, 3:15 a.m. | 51\u00a0minutes ago \nDescription : The Go1\u00a0also known as \"The World's First Intelligence Bionic Quadruped Robot Companion of Consumer Level,\" contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T05:12:12.000000Z"}