CVE-2025-11645: Insecure Storage of Sensitive Information in Tomofun Furbo Mobile App
A security vulnerability has been detected in Tomofun Furbo Mobile App up to 7.57.0a on Android. This affects an unknown part of the component Authentication Token Handler. The manipulation leads to insecure storage of sensitive information. It is possible to launch the attack on the physical device. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11645 identifies a security vulnerability in the Tomofun Furbo Mobile App version 7.57.0a on Android platforms. The vulnerability resides in the Authentication Token Handler component, where sensitive authentication tokens are stored insecurely on the physical device. This insecure storage could allow an attacker with physical access to the device to extract these tokens without requiring any authentication or user interaction. The tokens likely provide access to user accounts or connected services, so their compromise could lead to unauthorized access or control over the Furbo device or associated cloud services. The vulnerability has been publicly disclosed, but the vendor has not issued any patches or responses. The CVSS 4.0 score is 2.4, indicating low severity due to the requirement of physical access and limited impact on confidentiality and integrity. No known exploits are currently active in the wild. The lack of vendor response and patch availability increases the risk for users who cannot remediate the issue promptly. This vulnerability highlights the importance of secure storage practices for sensitive tokens within mobile applications, especially those controlling IoT devices.
Potential Impact
For European organizations and users, the primary impact is the potential compromise of sensitive authentication tokens stored by the Furbo Mobile App. This could lead to unauthorized access to the Furbo pet camera and related services, potentially exposing video feeds or personal user data. Although the vulnerability requires physical access to the device, it poses a risk in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations using Furbo devices in offices or employee homes could face privacy breaches or unauthorized surveillance risks. The impact on availability is minimal, but confidentiality and integrity of user data and device control are at risk. Given the low CVSS score, the threat is not critical but should not be ignored, especially in sectors with strict data protection regulations like GDPR in Europe. The absence of vendor patches means affected users must rely on operational security controls to mitigate risk.
Mitigation Recommendations
1. Restrict physical access to devices running the Furbo Mobile App to trusted individuals only. 2. Enable full device encryption on Android devices to protect stored data from extraction. 3. Use strong device lock mechanisms (PIN, password, biometric) to prevent unauthorized device access. 4. Monitor devices for unusual activity or unauthorized access attempts to the Furbo app or related services. 5. Regularly back up important data and consider removing the Furbo app from devices that cannot be physically secured. 6. Encourage the vendor to issue a patch or update that securely stores authentication tokens using Android’s secure storage APIs such as the Keystore system. 7. Educate users about the risks of physical device compromise and the importance of securing mobile devices that control IoT products. 8. Consider network-level protections such as segmenting IoT devices and monitoring network traffic for anomalies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-11645: Insecure Storage of Sensitive Information in Tomofun Furbo Mobile App
Description
A security vulnerability has been detected in Tomofun Furbo Mobile App up to 7.57.0a on Android. This affects an unknown part of the component Authentication Token Handler. The manipulation leads to insecure storage of sensitive information. It is possible to launch the attack on the physical device. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11645 identifies a security vulnerability in the Tomofun Furbo Mobile App version 7.57.0a on Android platforms. The vulnerability resides in the Authentication Token Handler component, where sensitive authentication tokens are stored insecurely on the physical device. This insecure storage could allow an attacker with physical access to the device to extract these tokens without requiring any authentication or user interaction. The tokens likely provide access to user accounts or connected services, so their compromise could lead to unauthorized access or control over the Furbo device or associated cloud services. The vulnerability has been publicly disclosed, but the vendor has not issued any patches or responses. The CVSS 4.0 score is 2.4, indicating low severity due to the requirement of physical access and limited impact on confidentiality and integrity. No known exploits are currently active in the wild. The lack of vendor response and patch availability increases the risk for users who cannot remediate the issue promptly. This vulnerability highlights the importance of secure storage practices for sensitive tokens within mobile applications, especially those controlling IoT devices.
Potential Impact
For European organizations and users, the primary impact is the potential compromise of sensitive authentication tokens stored by the Furbo Mobile App. This could lead to unauthorized access to the Furbo pet camera and related services, potentially exposing video feeds or personal user data. Although the vulnerability requires physical access to the device, it poses a risk in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations using Furbo devices in offices or employee homes could face privacy breaches or unauthorized surveillance risks. The impact on availability is minimal, but confidentiality and integrity of user data and device control are at risk. Given the low CVSS score, the threat is not critical but should not be ignored, especially in sectors with strict data protection regulations like GDPR in Europe. The absence of vendor patches means affected users must rely on operational security controls to mitigate risk.
Mitigation Recommendations
1. Restrict physical access to devices running the Furbo Mobile App to trusted individuals only. 2. Enable full device encryption on Android devices to protect stored data from extraction. 3. Use strong device lock mechanisms (PIN, password, biometric) to prevent unauthorized device access. 4. Monitor devices for unusual activity or unauthorized access attempts to the Furbo app or related services. 5. Regularly back up important data and consider removing the Furbo app from devices that cannot be physically secured. 6. Encourage the vendor to issue a patch or update that securely stores authentication tokens using Android’s secure storage APIs such as the Keystore system. 7. Educate users about the risks of physical device compromise and the importance of securing mobile devices that control IoT products. 8. Consider network-level protections such as segmenting IoT devices and monitoring network traffic for anomalies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-11T18:32:59.727Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ec117fb0f2f6c74eaacec2
Added to database: 10/12/2025, 8:37:19 PM
Last enriched: 10/12/2025, 8:50:05 PM
Last updated: 10/12/2025, 10:55:40 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11649: Use of Hard-coded Password in Tomofun Furbo 360
HighCVE-2025-11648: Server-Side Request Forgery in Tomofun Furbo 360
MediumCVE-2025-11647: Information Disclosure in Tomofun Furbo 360
LowCVE-2025-11646: Improper Access Controls in Tomofun Furbo 360
MediumCVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.