Article Details

Scrape Timestamp (UTC): 2025-08-29 21:03:23.555

Source: https://www.theregister.com/2025/08/29/pudu_robots_hackable/

Original Article Text

Click to Toggle View

Researcher who found McDonald's free-food hack turns her attention to Chinese restaurant robots. The admin controls were left wide open on Pudu's robots. A researcher caught the world’s leading supplier of commercial service robots using shoddy admin security that let attackers redirect the delivery machines to anywhere and make them follow any command. Pudu Robotics is a Chinese robot manufacturer with over 100,000 units in over 1,000 cities doing everything from serving meals with the cat-like BellaBot, to using its mechanical-armed FlashBot to operate human-designed systems like elevators, as you can see below. Youtube Video According to analysts Frost and Sullivan, last year it captured 23 percent of the market for such kit, but a hacker has found that the backend software systems controlling them are vulnerable to abuse. White-hat hacker Bobdahacker, who exposed the free-food flaw in McDonald's ordering system earlier this month, has been digging into Pudu and found she could exploit the control software behind the robots because administrators hadn’t locked down access. To do so, an attacker must have a valid auth token, which can be snaffled using a cross-site scripting intrusion, or someone could just set up an account to try before you buy a robot, she told The Register. With this level of access, an attacker could redirect food orders or shut down the entire fleet of restaurant robots in a DDoS food attack. Crims could also make FlashBot foul office systems up or steal intellectual property. Once she got past the initial authentication test, Bobdahacker found there were no extra security checks, enabling anyone to reset orders, move the robots to new locations, and rename them to make recovery that much harder. But when she alerted the business about the issue, she was stonewalled until she started contacting their customers. On August 12, she contacted Pudu about the issue, but the company's tech, support, and sales teams all blanked the warning. By August 21, she'd been reduced to emailing over 50 company staffers to try and get someone to take notice. It was only when she started contacting Pudu's restaurant customers that Bobdahacker got a call back. Japanese restaurant group Skylark Holdings, which has over 7,000 restaurants, and Zensho, a food chain, both took the warnings seriously. About 48 hours after Bobdahacker contacted these customers, Pudu replied with an email that looked like it was written by ChatGPT. "They couldn't even be bothered to replace the '[Your Email Address]' placeholder from their ChatGPT template. Peak effort right there," she said in her report. "On behalf of Pudu Robotics, I would like to extend our sincere gratitude for taking the time to report the security vulnerability to us. We highly appreciate your efforts in following responsible disclosure practices," the message read. "Thank you for your valuable contribution to our security. If you have any further details or questions, please do not hesitate to reach out to me directly at [Your Email Address]." On the bright side, Pudu locked down its systems and eliminated the security hole. It just goes to show that sometimes the best pressure you can put on a manufacturer to fix their problems comes from following the money and alerting customers. Pudu had no comment at press time.

Daily Brief Summary

VULNERABILITIES // Security Flaws in Pudu Robotics' Restaurant Robots Exposed

A cybersecurity researcher identified significant security vulnerabilities in Pudu Robotics' service robots, potentially allowing attackers to redirect or disable them.

Pudu Robotics, a key player in the commercial service robot market, left admin controls inadequately secured, exposing them to potential exploitation.

Attackers could exploit the robots by obtaining a valid authentication token, achievable through cross-site scripting or account setup.

The vulnerabilities could lead to severe disruptions, such as redirecting food orders or executing a DDoS-style attack on restaurant operations.

Initial attempts to alert Pudu Robotics were ignored, prompting the researcher to contact the company's restaurant clients directly.

Following customer pressure, Pudu Robotics addressed the security flaws, illustrating the effectiveness of involving stakeholders in vulnerability disclosures.

This incident serves as a reminder of the critical need for robust security measures in IoT devices, particularly those deployed in commercial environments.