CVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
A weakness has been identified in Tomofun Furbo 360 and Furbo Mini. Affected by this issue is some unknown functionality of the component UART Interface. Executing manipulation can lead to insecure storage of sensitive information. The physical device can be targeted for the attack. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be exploited. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11644 affects Tomofun Furbo 360 and Furbo Mini pet cameras, specifically relating to insecure storage of sensitive information within the UART interface component. The UART interface is a hardware communication protocol often used for debugging or device communication. In this case, manipulation of this interface can lead to sensitive data being stored insecurely, potentially exposing it to attackers who gain physical access to the device. The attack complexity is high, meaning exploitation requires specialized knowledge and physical proximity, and no authentication or user interaction is necessary. The affected firmware versions are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite the exploit being publicly available, there is no known active exploitation in the wild, and the vendor has not responded or provided patches. The CVSS 4.0 score of 1.0 reflects the low severity due to the attack vector (physical access), high complexity, and limited impact scope. The vulnerability primarily risks confidentiality by exposing sensitive information stored insecurely, but does not affect integrity or availability. This issue highlights the risks inherent in IoT devices that store sensitive data without adequate protection, especially when physical access controls are weak.
Potential Impact
For European organizations, the primary impact is the potential exposure of sensitive information stored on Furbo 360 and Furbo Mini devices if an attacker gains physical access. This could include personal data or credentials related to the device’s operation or user environment. While the attack complexity and physical access requirement limit widespread exploitation, organizations with these devices in accessible locations (e.g., offices, public spaces, or homes of employees) could face confidentiality breaches. The lack of vendor response and patches increases risk over time as devices remain vulnerable. Although the vulnerability does not directly impact device availability or integrity, leaked sensitive information could be leveraged for further attacks or privacy violations. The threat is more relevant for organizations using these devices in sensitive environments or where IoT security is critical. Additionally, the public availability of exploit code raises the risk of opportunistic attacks by skilled adversaries with physical access.
Mitigation Recommendations
1. Restrict physical access to Furbo 360 and Furbo Mini devices to trusted personnel only, especially in organizational environments. 2. Monitor devices regularly for signs of tampering or unauthorized access to hardware interfaces such as UART ports. 3. If possible, disable or physically block UART interfaces to prevent exploitation. 4. Replace affected devices with models that have verified secure storage and better physical security controls. 5. Implement network segmentation to isolate IoT devices from critical systems, limiting the impact of any data leakage. 6. Maintain an inventory of deployed Furbo devices and track firmware versions to identify vulnerable units. 7. Engage with the vendor or community for updates or unofficial patches, given the vendor’s lack of response. 8. Educate staff about the risks of physical device access and enforce policies to prevent unauthorized handling. 9. Consider additional endpoint security measures that detect anomalous device behavior or unauthorized hardware access. 10. For sensitive environments, avoid deploying consumer-grade IoT devices lacking robust security assurances.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
Description
A weakness has been identified in Tomofun Furbo 360 and Furbo Mini. Affected by this issue is some unknown functionality of the component UART Interface. Executing manipulation can lead to insecure storage of sensitive information. The physical device can be targeted for the attack. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be exploited. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-11644 affects Tomofun Furbo 360 and Furbo Mini pet cameras, specifically relating to insecure storage of sensitive information within the UART interface component. The UART interface is a hardware communication protocol often used for debugging or device communication. In this case, manipulation of this interface can lead to sensitive data being stored insecurely, potentially exposing it to attackers who gain physical access to the device. The attack complexity is high, meaning exploitation requires specialized knowledge and physical proximity, and no authentication or user interaction is necessary. The affected firmware versions are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite the exploit being publicly available, there is no known active exploitation in the wild, and the vendor has not responded or provided patches. The CVSS 4.0 score of 1.0 reflects the low severity due to the attack vector (physical access), high complexity, and limited impact scope. The vulnerability primarily risks confidentiality by exposing sensitive information stored insecurely, but does not affect integrity or availability. This issue highlights the risks inherent in IoT devices that store sensitive data without adequate protection, especially when physical access controls are weak.
Potential Impact
For European organizations, the primary impact is the potential exposure of sensitive information stored on Furbo 360 and Furbo Mini devices if an attacker gains physical access. This could include personal data or credentials related to the device’s operation or user environment. While the attack complexity and physical access requirement limit widespread exploitation, organizations with these devices in accessible locations (e.g., offices, public spaces, or homes of employees) could face confidentiality breaches. The lack of vendor response and patches increases risk over time as devices remain vulnerable. Although the vulnerability does not directly impact device availability or integrity, leaked sensitive information could be leveraged for further attacks or privacy violations. The threat is more relevant for organizations using these devices in sensitive environments or where IoT security is critical. Additionally, the public availability of exploit code raises the risk of opportunistic attacks by skilled adversaries with physical access.
Mitigation Recommendations
1. Restrict physical access to Furbo 360 and Furbo Mini devices to trusted personnel only, especially in organizational environments. 2. Monitor devices regularly for signs of tampering or unauthorized access to hardware interfaces such as UART ports. 3. If possible, disable or physically block UART interfaces to prevent exploitation. 4. Replace affected devices with models that have verified secure storage and better physical security controls. 5. Implement network segmentation to isolate IoT devices from critical systems, limiting the impact of any data leakage. 6. Maintain an inventory of deployed Furbo devices and track firmware versions to identify vulnerable units. 7. Engage with the vendor or community for updates or unofficial patches, given the vendor’s lack of response. 8. Educate staff about the risks of physical device access and enforce policies to prevent unauthorized handling. 9. Consider additional endpoint security measures that detect anomalous device behavior or unauthorized hardware access. 10. For sensitive environments, avoid deploying consumer-grade IoT devices lacking robust security assurances.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-11T18:32:56.286Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ec0b3b8f179ca8e875fda0
Added to database: 10/12/2025, 8:10:35 PM
Last enriched: 10/12/2025, 8:22:47 PM
Last updated: 10/12/2025, 9:38:06 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11646: Improper Access Controls in Tomofun Furbo 360
MediumCVE-2025-11645: Insecure Storage of Sensitive Information in Tomofun Furbo Mobile App
LowCVE-2025-11643: Hard-coded Credentials in Tomofun Furbo 360
MediumCVE-2025-11642: Denial of Service in Tomofun Furbo 360
MediumCVE-2025-11641: Improper Access Controls in Tomofun Furbo 360
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.