Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11633: Improper Certificate Validation in Tomofun Furbo 360

0
Medium
VulnerabilityCVE-2025-11633cvecve-2025-11633
Published: Sun Oct 12 2025 (10/12/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A vulnerability was identified in Tomofun Furbo 360 and Furbo Mini. Affected by this issue is some unknown functionality of the component HTTP Traffic Handler. The manipulation leads to improper certificate validation. The attack may be initiated remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/12/2025, 12:23:43 UTC

Technical Analysis

CVE-2025-11633 identifies a vulnerability in the Tomofun Furbo 360 and Furbo Mini smart pet cameras, specifically within an unspecified functionality of the HTTP Traffic Handler component. The issue stems from improper certificate validation, which can allow an attacker to perform man-in-the-middle (MitM) attacks by intercepting or manipulating HTTPS traffic between the device and its backend services. The vulnerability is exploitable remotely without requiring authentication or user interaction, but the attack complexity is high, indicating that exploitation requires significant skill or specific conditions. The affected firmware versions are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The CVSS 4.0 base score is 6.3 (medium severity), reflecting network attack vector, no privileges or user interaction needed, but high complexity and limited impact on confidentiality (low impact on integrity and availability). No known exploits have been reported in the wild, and the vendor has not responded to disclosure attempts, nor have patches been released. This vulnerability could allow attackers to bypass TLS protections, potentially leading to data interception or injection of malicious content, undermining the confidentiality and integrity of communications. Given the device's role in home security and privacy, this vulnerability poses a risk to user data and trust in the device's security.

Potential Impact

For European organizations and consumers using Tomofun Furbo devices, this vulnerability could compromise the confidentiality and integrity of data transmitted by these smart cameras. Although the direct impact on critical infrastructure is limited, the devices often reside in home or office environments where sensitive audio and video data are captured. Exploitation could lead to unauthorized surveillance or data leakage. Privacy regulations such as GDPR increase the stakes for organizations if personal data is compromised. The lack of vendor response and patch availability prolongs exposure, increasing risk over time. Additionally, attackers could leverage this vulnerability as a foothold to pivot into broader network environments if devices are connected to corporate networks. The medium severity and high attack complexity reduce the likelihood of widespread exploitation but do not eliminate risk, especially in targeted attacks against high-value individuals or organizations. European entities with smart office or home automation deployments should consider this vulnerability in their risk assessments.

Mitigation Recommendations

Since no patches are currently available, European organizations and users should implement compensating controls. First, isolate Furbo devices on separate network segments or VLANs to limit lateral movement and exposure to sensitive systems. Employ strict firewall rules to restrict outbound and inbound traffic to only trusted endpoints associated with Tomofun services. Monitor network traffic for unusual patterns or unexpected certificate anomalies that could indicate MitM attempts. Disable remote access features if not required, and avoid connecting these devices directly to corporate networks. Where possible, use network-level TLS inspection tools to detect improper certificate validation attempts. Maintain an inventory of affected devices and firmware versions to prioritize mitigation efforts. Engage with Tomofun for updates and monitor security advisories for patch releases. Finally, educate users about the risks of using vulnerable IoT devices in sensitive environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:32:19.461Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eb9db55b13363b9aae311e

Added to database: 10/12/2025, 12:23:17 PM

Last enriched: 10/12/2025, 12:23:43 PM

Last updated: 10/12/2025, 2:57:39 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats