CVE-2025-11634: Information Disclosure in Tomofun Furbo 360
A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. This affects an unknown part of the component UART Interface. The manipulation results in information disclosure. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11634 identifies an information disclosure vulnerability in the UART interface of Tomofun Furbo 360 and Furbo Mini smart pet cameras. The UART (Universal Asynchronous Receiver/Transmitter) interface is a hardware communication protocol often used for debugging or device management. The vulnerability allows an attacker with physical access to the device to manipulate the UART interface to extract sensitive information from the device. The exact nature of the disclosed information is unspecified but could include device configuration, firmware data, or other internal states. The flaw affects firmware versions Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Exploitation does not require authentication, user interaction, or network access, but physical access is mandatory, limiting the attack surface. The vendor was notified early but has not issued any response or patch, leaving devices vulnerable. The CVSS 4.0 vector indicates physical attack vector (AV:P), low attack complexity (AC:L), no privileges or user interaction required, and low impact on confidentiality. No known exploits have been reported in the wild, suggesting limited active exploitation. This vulnerability highlights risks in IoT devices where hardware interfaces may be overlooked in security design.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to the requirement for physical access and the limited scope of information disclosure. However, in environments where Furbo devices are deployed in accessible locations—such as offices, retail spaces, or public areas—an attacker could potentially extract sensitive device information that might aid in further attacks or privacy violations. Organizations using these devices for monitoring or security purposes could face confidentiality risks if attackers gain insights into device internals. Additionally, the lack of vendor response and patches increases the risk of prolonged exposure. While the direct impact on critical infrastructure is minimal, organizations should consider the potential for this vulnerability to be leveraged as part of a broader attack chain, especially in environments with weak physical security controls.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to Furbo 360 and Furbo Mini devices. This includes placing devices in secure locations, using tamper-evident seals, and monitoring physical access logs where possible. Network segmentation should be applied to isolate IoT devices from critical systems, limiting the potential impact of any compromise. Organizations should also monitor for unusual device behavior or signs of tampering. Since no patches are available, consider disabling or restricting UART interfaces if feasible, or replacing affected devices with models that have addressed this vulnerability. Engage with the vendor for updates and advocate for timely security patches. Finally, incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-11634: Information Disclosure in Tomofun Furbo 360
Description
A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. This affects an unknown part of the component UART Interface. The manipulation results in information disclosure. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11634 identifies an information disclosure vulnerability in the UART interface of Tomofun Furbo 360 and Furbo Mini smart pet cameras. The UART (Universal Asynchronous Receiver/Transmitter) interface is a hardware communication protocol often used for debugging or device management. The vulnerability allows an attacker with physical access to the device to manipulate the UART interface to extract sensitive information from the device. The exact nature of the disclosed information is unspecified but could include device configuration, firmware data, or other internal states. The flaw affects firmware versions Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Exploitation does not require authentication, user interaction, or network access, but physical access is mandatory, limiting the attack surface. The vendor was notified early but has not issued any response or patch, leaving devices vulnerable. The CVSS 4.0 vector indicates physical attack vector (AV:P), low attack complexity (AC:L), no privileges or user interaction required, and low impact on confidentiality. No known exploits have been reported in the wild, suggesting limited active exploitation. This vulnerability highlights risks in IoT devices where hardware interfaces may be overlooked in security design.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to the requirement for physical access and the limited scope of information disclosure. However, in environments where Furbo devices are deployed in accessible locations—such as offices, retail spaces, or public areas—an attacker could potentially extract sensitive device information that might aid in further attacks or privacy violations. Organizations using these devices for monitoring or security purposes could face confidentiality risks if attackers gain insights into device internals. Additionally, the lack of vendor response and patches increases the risk of prolonged exposure. While the direct impact on critical infrastructure is minimal, organizations should consider the potential for this vulnerability to be leveraged as part of a broader attack chain, especially in environments with weak physical security controls.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to Furbo 360 and Furbo Mini devices. This includes placing devices in secure locations, using tamper-evident seals, and monitoring physical access logs where possible. Network segmentation should be applied to isolate IoT devices from critical systems, limiting the potential impact of any compromise. Organizations should also monitor for unusual device behavior or signs of tampering. Since no patches are available, consider disabling or restricting UART interfaces if feasible, or replacing affected devices with models that have addressed this vulnerability. Engage with the vendor for updates and advocate for timely security patches. Finally, incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-11T18:32:22.501Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68eba4434919031131a7368e
Added to database: 10/12/2025, 12:51:15 PM
Last enriched: 10/12/2025, 12:51:33 PM
Last updated: 10/15/2025, 9:31:35 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9967: CWE-288 Authentication Bypass Using an Alternate Path or Channel in gsayed786 Orion SMS OTP Verification
CriticalCVE-2025-11728: CWE-306 Missing Authentication for Critical Function in oceanpayment Oceanpayment CreditCard Gateway
MediumCVE-2025-11722: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Woocommerce Category and Products Accordion Panel
HighCVE-2025-11701: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumCVE-2025-11692: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.