Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11635: Resource Consumption in Tomofun Furbo 360

0
Medium
VulnerabilityCVE-2025-11635cvecve-2025-11635
Published: Sun Oct 12 2025 (10/12/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A weakness has been identified in Tomofun Furbo 360 up to FB0035_FW_036. This vulnerability affects unknown code of the component File Upload. This manipulation causes resource consumption. Remote exploitation of the attack is possible. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/19/2025, 14:48:45 UTC

Technical Analysis

CVE-2025-11635 identifies a resource consumption vulnerability in the Tomofun Furbo 360 pet camera, specifically affecting firmware versions up to FB0035_FW_036. The vulnerability resides in an unspecified portion of the file upload component, which can be manipulated remotely by attackers to consume excessive device resources such as CPU, memory, or storage. This resource exhaustion could degrade device performance or cause denial of service, potentially rendering the camera inoperable. The attack requires no user interaction or authentication, and can be executed remotely over the network, increasing the risk of exploitation. The vendor Tomofun was notified early but has not issued any patches or advisories, leaving devices exposed. The CVSS 4.0 base score is 5.3 (medium), reflecting the ease of remote exploitation but limited impact scope since the vulnerability primarily affects device availability rather than confidentiality or integrity. No known exploits have been reported in the wild to date. The lack of detailed technical information about the exact file upload flaw limits deeper analysis, but the threat vector suggests attackers could repeatedly upload crafted files or requests to overwhelm the device's processing capabilities. This vulnerability is particularly relevant for environments where Furbo 360 cameras are deployed at scale or integrated into smart home or pet monitoring systems.

Potential Impact

For European organizations and consumers using Tomofun Furbo 360 devices, this vulnerability could lead to denial of service conditions, disrupting pet monitoring and related functionalities. In commercial or institutional settings such as veterinary clinics, pet care facilities, or smart home service providers, such disruptions could impact operational continuity and customer trust. Although the vulnerability does not directly compromise data confidentiality or integrity, loss of availability may cause indirect consequences such as missed alerts or inability to monitor pets remotely. The remote and unauthenticated nature of the exploit increases the risk of opportunistic attacks, especially in environments with exposed or poorly segmented networks. Given the vendor's lack of response, affected organizations may face prolonged exposure. The impact is more pronounced in countries with higher adoption rates of smart pet devices and connected home technologies, where the Furbo 360 is popular. Additionally, the vulnerability could be leveraged as part of broader attack campaigns targeting IoT devices to create botnets or conduct denial of service attacks on network infrastructure.

Mitigation Recommendations

Since no official patch or firmware update is currently available from Tomofun, affected users and organizations should implement network-level mitigations. These include isolating Furbo 360 devices on segmented VLANs or dedicated IoT networks to limit exposure to untrusted networks. Employing firewall rules to restrict inbound traffic to the minimum necessary and monitoring network traffic for unusual file upload activity can help detect exploitation attempts. Disabling or restricting file upload functionality if configurable may reduce risk. Regularly auditing device firmware versions and subscribing to vendor or security advisories is critical to apply updates promptly once available. For enterprise environments, consider deploying intrusion detection systems (IDS) or intrusion prevention systems (IPS) with signatures targeting anomalous file upload patterns. Educating users about the risks and encouraging physical security of devices can also mitigate attack vectors. Finally, organizations should evaluate alternative pet monitoring solutions with stronger security postures if risk tolerance is low.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:32:25.348Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ebb8db8ff13aa08ba99207

Added to database: 10/12/2025, 2:19:07 PM

Last enriched: 10/19/2025, 2:48:45 PM

Last updated: 12/4/2025, 6:03:44 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats