Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11639: Insecure Storage of Sensitive Information in Tomofun Furbo 360

0
Medium
VulnerabilityCVE-2025-11639cvecve-2025-11639
Published: Sun Oct 12 2025 (10/12/2025, 17:32:04 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. The impacted element is an unknown function of the file collect_logs.sh of the component Debug Log S3 Bucket Handler. The manipulation leads to insecure storage of sensitive information. An attack has to be approached locally. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/19/2025, 18:00:16 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11639 affects the Tomofun Furbo 360 and Furbo Mini pet cameras, specifically in the component responsible for managing debug logs stored in an Amazon S3 bucket. The issue resides in the collect_logs.sh script, which handles debug log collection and storage. Due to insecure handling within this script, sensitive information is stored improperly, potentially exposing it to unauthorized local users. The attack vector requires local access to the device, meaning an attacker must already have some level of access to the device's operating environment. The vulnerability does not require user interaction or elevated privileges beyond local access, making it easier to exploit once local access is obtained. The affected firmware versions include Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor, Tomofun, was contacted early about this issue but did not respond or provide patches. The CVSS 4.0 base score is 4.8, reflecting a medium severity primarily due to the local attack vector and limited impact on integrity and availability. No known exploits have been reported in the wild, but the insecure storage of sensitive data could lead to confidentiality breaches if an attacker gains local access. This vulnerability highlights the risks associated with IoT devices that handle sensitive user data but lack robust security controls for local access and data storage.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential exposure of sensitive information stored on Furbo 360 and Furbo Mini devices. These devices are commonly used in private homes but may also be present in office environments for pet monitoring. If an attacker gains local access—through physical access or compromised internal networks—they could retrieve sensitive debug logs containing private user data or device information. This could lead to privacy violations, data leakage, and potential further compromise if the logs contain credentials or network details. Although the vulnerability does not directly affect device availability or integrity, the confidentiality impact is significant, especially under GDPR regulations that mandate protection of personal data. Organizations using these devices should consider the risk of insider threats or unauthorized physical access. The lack of vendor response and patches increases the risk exposure duration. While the attack requires local access, environments with weak physical security or insufficient network segmentation may be vulnerable. The impact is thus more pronounced in settings where these devices are deployed in sensitive or regulated environments.

Mitigation Recommendations

1. Restrict physical access to Furbo 360 and Furbo Mini devices to trusted personnel only, minimizing the risk of local exploitation. 2. Implement network segmentation to isolate IoT devices from critical business networks, reducing the chance of attackers gaining local access remotely. 3. Monitor device logs and network traffic for unusual access patterns that could indicate attempts to exploit local vulnerabilities. 4. If possible, disable debug logging features or restrict access to the debug log storage locations to prevent unauthorized data retrieval. 5. Regularly audit firmware versions and device configurations to identify affected devices and prepare for future patches. 6. Engage with Tomofun support channels persistently to request security updates or official patches. 7. Consider replacing vulnerable devices with alternatives that have stronger security postures if mitigation is not feasible. 8. Educate staff about the risks of local device access and enforce policies to prevent unauthorized physical or network access to IoT devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:32:37.387Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ebe832514ee80e17c46bb6

Added to database: 10/12/2025, 5:41:06 PM

Last enriched: 10/19/2025, 6:00:16 PM

Last updated: 12/3/2025, 1:23:23 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats