CVE-2025-11643: Hard-coded Credentials in Tomofun Furbo 360
A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11643 identifies a security vulnerability in the Tomofun Furbo 360 and Furbo Mini pet cameras, specifically related to hard-coded credentials embedded within the MQTT Client Certificate component found in the file /squashfs-root/furbo_img. MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol commonly used in IoT devices for communication. The presence of hard-coded credentials means that attackers who discover these static authentication details can potentially connect to the device’s MQTT service remotely, bypassing normal authentication mechanisms. This could allow unauthorized access to device communications or control functions. The vulnerability affects firmware versions up to FB0035_FW_036 for Furbo 360 and MC0020_FW_074 for Furbo Mini. The attack vector is remote network access, requiring no user interaction or prior authentication, but the attack complexity is rated high, indicating exploitation is difficult, possibly due to additional environmental or technical constraints. The vendor Tomofun was contacted early for remediation but has not responded, and no patches or mitigations have been published. The CVSS v4.0 score is 6.3 (medium severity), reflecting the balance between the potential impact and the difficulty of exploitation. No known exploits have been reported in the wild to date. This vulnerability could compromise confidentiality and integrity of data transmitted by the device, potentially allowing attackers to intercept or manipulate communications or gain unauthorized control over the device’s functions.
Potential Impact
For European organizations, the primary impact of CVE-2025-11643 lies in the potential compromise of confidentiality and integrity of communications from affected Furbo devices. These devices are typically consumer-grade pet cameras but may be used in small office or home office environments. Unauthorized access via hard-coded MQTT credentials could allow attackers to eavesdrop on video streams, manipulate device settings, or use the device as a foothold for lateral movement within a network. While the direct impact on availability is limited, the breach of privacy and potential data leakage is significant, especially under GDPR regulations concerning personal data protection. Organizations relying on these devices for monitoring or security purposes may face reputational damage and regulatory penalties if data is exposed. The high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value individuals or organizations using these devices remain a concern. Lack of vendor response and patches increases the risk exposure duration.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should implement specific mitigations to reduce risk. First, isolate Furbo devices on segmented network zones or VLANs separate from critical business systems to limit lateral movement if compromised. Disable or restrict MQTT communication where possible, or configure network firewalls to block unauthorized MQTT traffic to and from these devices. Monitor network traffic for unusual MQTT connection attempts or unexpected data flows. Employ network intrusion detection systems (NIDS) with signatures for MQTT anomalies. Regularly audit firmware versions and avoid deploying affected versions; if possible, upgrade to newer firmware once available. Consider replacing devices with known vulnerabilities if they cannot be adequately secured. Educate users about the risks of IoT devices with hard-coded credentials and enforce strict network access controls. Finally, maintain an incident response plan that includes IoT device compromise scenarios.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-11643: Hard-coded Credentials in Tomofun Furbo 360
Description
A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11643 identifies a security vulnerability in the Tomofun Furbo 360 and Furbo Mini pet cameras, specifically related to hard-coded credentials embedded within the MQTT Client Certificate component found in the file /squashfs-root/furbo_img. MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol commonly used in IoT devices for communication. The presence of hard-coded credentials means that attackers who discover these static authentication details can potentially connect to the device’s MQTT service remotely, bypassing normal authentication mechanisms. This could allow unauthorized access to device communications or control functions. The vulnerability affects firmware versions up to FB0035_FW_036 for Furbo 360 and MC0020_FW_074 for Furbo Mini. The attack vector is remote network access, requiring no user interaction or prior authentication, but the attack complexity is rated high, indicating exploitation is difficult, possibly due to additional environmental or technical constraints. The vendor Tomofun was contacted early for remediation but has not responded, and no patches or mitigations have been published. The CVSS v4.0 score is 6.3 (medium severity), reflecting the balance between the potential impact and the difficulty of exploitation. No known exploits have been reported in the wild to date. This vulnerability could compromise confidentiality and integrity of data transmitted by the device, potentially allowing attackers to intercept or manipulate communications or gain unauthorized control over the device’s functions.
Potential Impact
For European organizations, the primary impact of CVE-2025-11643 lies in the potential compromise of confidentiality and integrity of communications from affected Furbo devices. These devices are typically consumer-grade pet cameras but may be used in small office or home office environments. Unauthorized access via hard-coded MQTT credentials could allow attackers to eavesdrop on video streams, manipulate device settings, or use the device as a foothold for lateral movement within a network. While the direct impact on availability is limited, the breach of privacy and potential data leakage is significant, especially under GDPR regulations concerning personal data protection. Organizations relying on these devices for monitoring or security purposes may face reputational damage and regulatory penalties if data is exposed. The high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value individuals or organizations using these devices remain a concern. Lack of vendor response and patches increases the risk exposure duration.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should implement specific mitigations to reduce risk. First, isolate Furbo devices on segmented network zones or VLANs separate from critical business systems to limit lateral movement if compromised. Disable or restrict MQTT communication where possible, or configure network firewalls to block unauthorized MQTT traffic to and from these devices. Monitor network traffic for unusual MQTT connection attempts or unexpected data flows. Employ network intrusion detection systems (NIDS) with signatures for MQTT anomalies. Regularly audit firmware versions and avoid deploying affected versions; if possible, upgrade to newer firmware once available. Consider replacing devices with known vulnerabilities if they cannot be adequately secured. Educate users about the risks of IoT devices with hard-coded credentials and enforce strict network access controls. Finally, maintain an incident response plan that includes IoT device compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-11T18:32:53.176Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ec04772ad1f36bd948e97a
Added to database: 10/12/2025, 7:41:43 PM
Last enriched: 10/12/2025, 7:55:12 PM
Last updated: 10/12/2025, 9:38:10 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11646: Improper Access Controls in Tomofun Furbo 360
MediumCVE-2025-11645: Insecure Storage of Sensitive Information in Tomofun Furbo Mobile App
LowCVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
LowCVE-2025-11642: Denial of Service in Tomofun Furbo 360
MediumCVE-2025-11641: Improper Access Controls in Tomofun Furbo 360
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.