CVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
A weakness has been identified in Tomofun Furbo 360 and Furbo Mini. Affected by this issue is some unknown functionality of the component UART Interface. Executing manipulation can lead to insecure storage of sensitive information. The physical device can be targeted for the attack. This attack is characterized by high complexity. The exploitation is known to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11644 identifies a security weakness in the Tomofun Furbo 360 and Furbo Mini pet cameras, specifically related to the UART interface component. The vulnerability allows for insecure storage of sensitive information on the physical device. This means that an attacker with physical access to the device could potentially manipulate the UART interface to extract sensitive data stored insecurely within the device's firmware or memory. The attack complexity is high, requiring specialized knowledge and physical access, and no authentication or user interaction is needed once physical access is obtained. The affected firmware versions are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite early notification, the vendor has not issued a patch or response. The CVSS 4.0 vector indicates a low severity score of 1.0, reflecting that the attack vector is physical (AV:P), with high attack complexity (AC:H), no privileges or user interaction required, and low impact on confidentiality. There are no known exploits in the wild, and the scope is limited to the physical device. This vulnerability primarily threatens confidentiality by potentially exposing sensitive information stored insecurely. The lack of vendor response and patch availability means users must rely on physical security controls and monitoring until a fix is released.
Potential Impact
For European organizations, the impact of this vulnerability is limited but non-negligible. Since exploitation requires physical access to the device, remote attacks are not feasible, reducing the risk for large-scale breaches. However, in environments where Furbo devices are deployed in accessible locations (e.g., offices, retail spaces, or homes of employees), attackers with physical proximity could extract sensitive data, potentially including network credentials or personal information. This could lead to privacy violations or facilitate further attacks if sensitive data is leveraged. The low CVSS score and high complexity reduce urgency but do not eliminate risk, especially in regulated sectors with strict data protection requirements such as GDPR. The absence of vendor patches increases the window of exposure. Organizations using these devices should evaluate their physical security policies and consider the sensitivity of data potentially exposed by these cameras.
Mitigation Recommendations
1. Restrict physical access to Furbo 360 and Furbo Mini devices, especially in sensitive environments, to prevent unauthorized manipulation of the UART interface. 2. Monitor for firmware updates or security advisories from Tomofun and apply patches promptly once available. 3. Consider disabling or physically blocking UART interface access if feasible, to reduce attack surface. 4. Conduct regular audits of device placement and access controls to ensure devices are not left in publicly accessible areas. 5. If possible, replace affected devices with newer models or alternative products that have addressed this vulnerability. 6. Educate staff about the risks of physical tampering with IoT devices and enforce policies to report suspicious activity. 7. Implement network segmentation to isolate IoT devices from critical systems, limiting potential lateral movement if data is compromised. 8. Maintain an inventory of all Furbo devices deployed and track firmware versions to identify vulnerable units.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
Description
A weakness has been identified in Tomofun Furbo 360 and Furbo Mini. Affected by this issue is some unknown functionality of the component UART Interface. Executing manipulation can lead to insecure storage of sensitive information. The physical device can be targeted for the attack. This attack is characterized by high complexity. The exploitation is known to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11644 identifies a security weakness in the Tomofun Furbo 360 and Furbo Mini pet cameras, specifically related to the UART interface component. The vulnerability allows for insecure storage of sensitive information on the physical device. This means that an attacker with physical access to the device could potentially manipulate the UART interface to extract sensitive data stored insecurely within the device's firmware or memory. The attack complexity is high, requiring specialized knowledge and physical access, and no authentication or user interaction is needed once physical access is obtained. The affected firmware versions are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite early notification, the vendor has not issued a patch or response. The CVSS 4.0 vector indicates a low severity score of 1.0, reflecting that the attack vector is physical (AV:P), with high attack complexity (AC:H), no privileges or user interaction required, and low impact on confidentiality. There are no known exploits in the wild, and the scope is limited to the physical device. This vulnerability primarily threatens confidentiality by potentially exposing sensitive information stored insecurely. The lack of vendor response and patch availability means users must rely on physical security controls and monitoring until a fix is released.
Potential Impact
For European organizations, the impact of this vulnerability is limited but non-negligible. Since exploitation requires physical access to the device, remote attacks are not feasible, reducing the risk for large-scale breaches. However, in environments where Furbo devices are deployed in accessible locations (e.g., offices, retail spaces, or homes of employees), attackers with physical proximity could extract sensitive data, potentially including network credentials or personal information. This could lead to privacy violations or facilitate further attacks if sensitive data is leveraged. The low CVSS score and high complexity reduce urgency but do not eliminate risk, especially in regulated sectors with strict data protection requirements such as GDPR. The absence of vendor patches increases the window of exposure. Organizations using these devices should evaluate their physical security policies and consider the sensitivity of data potentially exposed by these cameras.
Mitigation Recommendations
1. Restrict physical access to Furbo 360 and Furbo Mini devices, especially in sensitive environments, to prevent unauthorized manipulation of the UART interface. 2. Monitor for firmware updates or security advisories from Tomofun and apply patches promptly once available. 3. Consider disabling or physically blocking UART interface access if feasible, to reduce attack surface. 4. Conduct regular audits of device placement and access controls to ensure devices are not left in publicly accessible areas. 5. If possible, replace affected devices with newer models or alternative products that have addressed this vulnerability. 6. Educate staff about the risks of physical tampering with IoT devices and enforce policies to report suspicious activity. 7. Implement network segmentation to isolate IoT devices from critical systems, limiting potential lateral movement if data is compromised. 8. Maintain an inventory of all Furbo devices deployed and track firmware versions to identify vulnerable units.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-11T18:32:56.286Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ec0b3b8f179ca8e875fda0
Added to database: 10/12/2025, 8:10:35 PM
Last enriched: 10/19/2025, 8:30:11 PM
Last updated: 12/4/2025, 5:07:13 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.