Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360

0
Low
VulnerabilityCVE-2025-11644cvecve-2025-11644
Published: Sun Oct 12 2025 (10/12/2025, 20:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A weakness has been identified in Tomofun Furbo 360 and Furbo Mini. Affected by this issue is some unknown functionality of the component UART Interface. Executing manipulation can lead to insecure storage of sensitive information. The physical device can be targeted for the attack. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be exploited. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/12/2025, 20:22:47 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11644 affects Tomofun Furbo 360 and Furbo Mini pet cameras, specifically relating to insecure storage of sensitive information within the UART interface component. The UART interface is a hardware communication protocol often used for debugging or device communication. In this case, manipulation of this interface can lead to sensitive data being stored insecurely, potentially exposing it to attackers who gain physical access to the device. The attack complexity is high, meaning exploitation requires specialized knowledge and physical proximity, and no authentication or user interaction is necessary. The affected firmware versions are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite the exploit being publicly available, there is no known active exploitation in the wild, and the vendor has not responded or provided patches. The CVSS 4.0 score of 1.0 reflects the low severity due to the attack vector (physical access), high complexity, and limited impact scope. The vulnerability primarily risks confidentiality by exposing sensitive information stored insecurely, but does not affect integrity or availability. This issue highlights the risks inherent in IoT devices that store sensitive data without adequate protection, especially when physical access controls are weak.

Potential Impact

For European organizations, the primary impact is the potential exposure of sensitive information stored on Furbo 360 and Furbo Mini devices if an attacker gains physical access. This could include personal data or credentials related to the device’s operation or user environment. While the attack complexity and physical access requirement limit widespread exploitation, organizations with these devices in accessible locations (e.g., offices, public spaces, or homes of employees) could face confidentiality breaches. The lack of vendor response and patches increases risk over time as devices remain vulnerable. Although the vulnerability does not directly impact device availability or integrity, leaked sensitive information could be leveraged for further attacks or privacy violations. The threat is more relevant for organizations using these devices in sensitive environments or where IoT security is critical. Additionally, the public availability of exploit code raises the risk of opportunistic attacks by skilled adversaries with physical access.

Mitigation Recommendations

1. Restrict physical access to Furbo 360 and Furbo Mini devices to trusted personnel only, especially in organizational environments. 2. Monitor devices regularly for signs of tampering or unauthorized access to hardware interfaces such as UART ports. 3. If possible, disable or physically block UART interfaces to prevent exploitation. 4. Replace affected devices with models that have verified secure storage and better physical security controls. 5. Implement network segmentation to isolate IoT devices from critical systems, limiting the impact of any data leakage. 6. Maintain an inventory of deployed Furbo devices and track firmware versions to identify vulnerable units. 7. Engage with the vendor or community for updates or unofficial patches, given the vendor’s lack of response. 8. Educate staff about the risks of physical device access and enforce policies to prevent unauthorized handling. 9. Consider additional endpoint security measures that detect anomalous device behavior or unauthorized hardware access. 10. For sensitive environments, avoid deploying consumer-grade IoT devices lacking robust security assurances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:32:56.286Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ec0b3b8f179ca8e875fda0

Added to database: 10/12/2025, 8:10:35 PM

Last enriched: 10/12/2025, 8:22:47 PM

Last updated: 10/12/2025, 9:38:06 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats