Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11646: Improper Access Controls in Tomofun Furbo 360

0
Medium
VulnerabilityCVE-2025-11646cvecve-2025-11646
Published: Sun Oct 12 2025 (10/12/2025, 21:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A vulnerability was detected in Tomofun Furbo 360 and Furbo Mini. This vulnerability affects unknown code of the component GATT Service. The manipulation results in improper access controls. The attack can only be performed from the local network. The exploit is now public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/12/2025, 21:17:42 UTC

Technical Analysis

CVE-2025-11646 identifies an improper access control vulnerability in the GATT Service component of Tomofun Furbo 360 and Furbo Mini pet cameras. The flaw allows an attacker on the same local network to bypass access restrictions, potentially gaining unauthorized access to device functions or data. The vulnerability does not require authentication, user interaction, or elevated privileges, making it relatively easy to exploit within the local network environment. The affected firmware versions include Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vulnerability is rooted in the Bluetooth Low Energy (BLE) GATT service implementation, which is responsible for device communication and control. Improper access controls in this service could allow attackers to read or write sensitive attributes, potentially leading to privacy violations or device manipulation. The vendor Tomofun was contacted early but did not respond or provide patches, and no official fixes are currently available. Public exploit code has been released, increasing the risk of exploitation, although no widespread attacks have been reported to date. The vulnerability’s CVSS 4.0 score is 5.3 (medium), reflecting its local attack vector, lack of authentication requirements, and limited impact scope. This vulnerability primarily threatens environments where these devices are deployed on shared or poorly segmented local networks, such as home or small office networks.

Potential Impact

For European organizations, the primary impact of CVE-2025-11646 is on privacy and security of IoT devices used in residential or office settings. Unauthorized local network attackers could exploit this flaw to access video streams, manipulate device settings, or disrupt device availability, potentially leading to privacy breaches or denial of service. While the attack requires local network access, many European homes and small businesses have Wi-Fi networks that could be compromised or accessed by malicious insiders or nearby attackers. This vulnerability could undermine trust in IoT devices and expose sensitive personal or corporate information captured by these cameras. Additionally, exploitation could serve as a foothold for lateral movement within local networks, increasing overall risk. The lack of vendor response and patches exacerbates the threat, requiring organizations to rely on network-level controls. The impact is more pronounced in environments with weak network segmentation or where these devices are integrated into broader smart office or home automation systems.

Mitigation Recommendations

1. Segment IoT devices like Furbo cameras onto isolated VLANs or separate Wi-Fi networks to limit local network exposure. 2. Disable Bluetooth or GATT services if not required for device operation to reduce attack surface. 3. Monitor local network traffic for unusual BLE or device communication patterns indicative of exploitation attempts. 4. Enforce strong Wi-Fi security, including WPA3 where possible, and restrict guest network access to prevent unauthorized local access. 5. Regularly audit IoT device firmware versions and configurations, and apply updates promptly when vendor patches become available. 6. Consider replacing affected devices with alternatives from vendors with active security support if patching is not forthcoming. 7. Educate users about the risks of local network attacks and encourage secure network practices. 8. Employ network intrusion detection systems capable of BLE protocol monitoring to detect suspicious activity. 9. Use strong network access controls and authentication mechanisms for all network segments hosting IoT devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:33:03.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ec1ad92951d0f0a8712bfd

Added to database: 10/12/2025, 9:17:13 PM

Last enriched: 10/12/2025, 9:17:42 PM

Last updated: 10/12/2025, 11:53:34 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats