Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11646: Improper Access Controls in Tomofun Furbo 360

0
Medium
VulnerabilityCVE-2025-11646cvecve-2025-11646
Published: Sun Oct 12 2025 (10/12/2025, 21:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A vulnerability was detected in Tomofun Furbo 360 and Furbo Mini. This vulnerability affects unknown code of the component GATT Service. The manipulation results in improper access controls. The attack can only be performed from the local network. The exploit is now public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/19/2025, 21:32:30 UTC

Technical Analysis

CVE-2025-11646 is a vulnerability identified in the Tomofun Furbo 360 and Furbo Mini pet cameras, specifically within an unspecified portion of the GATT (Generic Attribute Profile) Service component. The vulnerability arises from improper access controls, which means that the device does not adequately restrict access to certain functions or data over the Bluetooth Low Energy (BLE) interface. Exploitation requires the attacker to be on the same local network as the device, as the attack vector is limited to local network access. No authentication or user interaction is necessary, which lowers the barrier for exploitation once local access is achieved. The vulnerability affects firmware versions up to FB0035_FW_036 for Furbo 360 and MC0020_FW_074 for Furbo Mini. The flaw could allow an attacker to read or manipulate data or device functions, potentially leading to unauthorized surveillance, privacy breaches, or disruption of device operation. The vendor, Tomofun, was contacted early but has not responded or provided patches, and a public exploit is available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the limited attack vector but ease of exploitation and potential impact on confidentiality, integrity, and availability. The vulnerability does not affect system components beyond the local network scope and does not require privileges or user interaction, but the presence of a public exploit raises the urgency for mitigation.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in privacy and security risks associated with the use of Furbo 360 and Furbo Mini devices in homes, offices, or small business environments. Unauthorized local network attackers could exploit this flaw to gain access to video feeds or control device functions, leading to breaches of confidentiality and potential surveillance. Integrity of device operation could be compromised, allowing attackers to manipulate device behavior or disable security features. Availability impacts are possible if the device is disrupted or rendered inoperable. While the attack requires local network access, many European environments have increasingly interconnected smart home and office networks, sometimes with insufficient segmentation or security controls, increasing exposure. The lack of vendor response and patches means organizations must rely on network-level mitigations. The risk is heightened in environments where these devices are used in sensitive areas or where local network access controls are weak. The vulnerability does not pose a direct threat to critical infrastructure but can contribute to broader security risks if attackers leverage compromised devices as footholds within local networks.

Mitigation Recommendations

1. Network Segmentation: Isolate Furbo devices on a separate VLAN or guest network to limit local network exposure and reduce the risk of unauthorized access. 2. Disable Bluetooth if not required: Since the vulnerability involves the GATT Service (BLE), disabling Bluetooth on the device or network where possible can reduce attack surface. 3. Strong Local Network Security: Enforce strong Wi-Fi encryption (WPA3 if available), use complex passwords, and restrict network access to trusted devices only. 4. Monitor Network Traffic: Implement network monitoring to detect unusual BLE or device communication patterns indicative of exploitation attempts. 5. Device Usage Policies: Limit the placement of these devices in sensitive areas and educate users about the risks of local network attacks. 6. Firmware Updates: Regularly check for vendor updates or community patches, and apply them promptly once available. 7. Vendor Engagement: Encourage Tomofun to respond and provide official patches or mitigations. 8. Incident Response Preparedness: Prepare to isolate or remove vulnerable devices quickly if exploitation is suspected. These steps go beyond generic advice by focusing on network architecture and device-specific controls relevant to this vulnerability's attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:33:03.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ec1ad92951d0f0a8712bfd

Added to database: 10/12/2025, 9:17:13 PM

Last enriched: 10/19/2025, 9:32:30 PM

Last updated: 12/4/2025, 10:50:51 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats