CVE-2025-11647: Information Disclosure in Tomofun Furbo 360
A flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11647 is a low-severity information disclosure vulnerability identified in the Tomofun Furbo 360 and Furbo Mini pet cameras. The issue stems from improper processing of the DeviceToken argument within the Bluetooth GATT Service component. An attacker positioned within the same local network can manipulate this argument to cause unintended information disclosure, potentially leaking sensitive device or user data. The attack vector is local network access, requiring proximity or network access to the victim device. The complexity of the attack is high, indicating that exploitation demands significant technical skill and effort, and no user interaction or authentication is required. The affected firmware versions include Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite early vendor notification, no patches or official responses have been issued. The CVSS 4.0 vector (AV:A/AC:H/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) reflects a low base score of 2.3, emphasizing limited confidentiality impact and difficult exploit conditions. No known exploits have been reported in the wild, suggesting minimal current threat activity. The vulnerability highlights the risks inherent in IoT devices with Bluetooth interfaces and the importance of secure firmware design and vendor responsiveness.
Potential Impact
For European organizations, the impact of CVE-2025-11647 is generally low due to the requirement for local network access and the high complexity of exploitation. However, organizations using Tomofun Furbo 360 or Furbo Mini devices in environments where local network access is shared or less controlled—such as offices with open Wi-Fi or multi-tenant buildings—could face information leakage risks. The disclosed information could potentially aid attackers in further reconnaissance or targeted attacks against IoT infrastructure or connected networks. Privacy concerns may arise if sensitive user or device data is exposed, potentially conflicting with GDPR requirements. The lack of vendor response and absence of patches increase the risk of future exploitation if attackers develop more accessible exploit methods. Overall, while the direct operational impact is limited, the vulnerability underscores the need for vigilance in managing IoT devices within enterprise networks.
Mitigation Recommendations
European organizations should implement network segmentation to isolate IoT devices like Furbo cameras from critical business systems and sensitive data networks. Restrict Bluetooth and local network access to trusted users and devices only, employing strong Wi-Fi security measures and monitoring for unauthorized connections. Disable or limit Bluetooth functionality on these devices if not required. Regularly audit and inventory IoT devices to identify vulnerable firmware versions and plan for device replacement or firmware upgrades when available. Employ network intrusion detection systems (NIDS) capable of detecting anomalous Bluetooth or local network activity. Engage with the vendor or community forums to track any forthcoming patches or firmware updates addressing this issue. Consider deploying endpoint security solutions that monitor IoT device behavior for signs of compromise. Finally, educate users about the risks of connecting IoT devices to unsecured or public networks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-11647: Information Disclosure in Tomofun Furbo 360
Description
A flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11647 is a low-severity information disclosure vulnerability identified in the Tomofun Furbo 360 and Furbo Mini pet cameras. The issue stems from improper processing of the DeviceToken argument within the Bluetooth GATT Service component. An attacker positioned within the same local network can manipulate this argument to cause unintended information disclosure, potentially leaking sensitive device or user data. The attack vector is local network access, requiring proximity or network access to the victim device. The complexity of the attack is high, indicating that exploitation demands significant technical skill and effort, and no user interaction or authentication is required. The affected firmware versions include Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite early vendor notification, no patches or official responses have been issued. The CVSS 4.0 vector (AV:A/AC:H/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) reflects a low base score of 2.3, emphasizing limited confidentiality impact and difficult exploit conditions. No known exploits have been reported in the wild, suggesting minimal current threat activity. The vulnerability highlights the risks inherent in IoT devices with Bluetooth interfaces and the importance of secure firmware design and vendor responsiveness.
Potential Impact
For European organizations, the impact of CVE-2025-11647 is generally low due to the requirement for local network access and the high complexity of exploitation. However, organizations using Tomofun Furbo 360 or Furbo Mini devices in environments where local network access is shared or less controlled—such as offices with open Wi-Fi or multi-tenant buildings—could face information leakage risks. The disclosed information could potentially aid attackers in further reconnaissance or targeted attacks against IoT infrastructure or connected networks. Privacy concerns may arise if sensitive user or device data is exposed, potentially conflicting with GDPR requirements. The lack of vendor response and absence of patches increase the risk of future exploitation if attackers develop more accessible exploit methods. Overall, while the direct operational impact is limited, the vulnerability underscores the need for vigilance in managing IoT devices within enterprise networks.
Mitigation Recommendations
European organizations should implement network segmentation to isolate IoT devices like Furbo cameras from critical business systems and sensitive data networks. Restrict Bluetooth and local network access to trusted users and devices only, employing strong Wi-Fi security measures and monitoring for unauthorized connections. Disable or limit Bluetooth functionality on these devices if not required. Regularly audit and inventory IoT devices to identify vulnerable firmware versions and plan for device replacement or firmware upgrades when available. Employ network intrusion detection systems (NIDS) capable of detecting anomalous Bluetooth or local network activity. Engage with the vendor or community forums to track any forthcoming patches or firmware updates addressing this issue. Consider deploying endpoint security solutions that monitor IoT device behavior for signs of compromise. Finally, educate users about the risks of connecting IoT devices to unsecured or public networks.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-11T18:33:06.599Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ec21584063b57761c6472e
Added to database: 10/12/2025, 9:44:56 PM
Last enriched: 10/19/2025, 10:03:27 PM
Last updated: 1/19/2026, 12:22:13 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit
MediumCVE-2025-15539: Denial of Service in Open5GS
MediumCVE-2026-23733: CWE-94: Improper Control of Generation of Code ('Code Injection') in lobehub lobe-chat
MediumCVE-2025-15538: Use After Free in Open Asset Import Library Assimp
MediumCVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.