Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11648: Server-Side Request Forgery in Tomofun Furbo 360

0
Medium
VulnerabilityCVE-2025-11648cvecve-2025-11648
Published: Sun Oct 12 2025 (10/12/2025, 22:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Tomofun
Product: Furbo 360

Description

A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/12/2025, 22:12:24 UTC

Technical Analysis

CVE-2025-11648 is a server-side request forgery vulnerability identified in Tomofun's Furbo 360 and Furbo Mini pet cameras. The vulnerability resides in the GATT Interface URL Handler component, specifically involving the TF_FQDN.json file, which is responsible for handling certain URL requests. An attacker can manipulate this component to cause the device to send crafted requests to arbitrary internal or external network resources. This SSRF can be leveraged to access internal services that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal network scanning or exploitation of other vulnerabilities. The attack can be performed remotely without requiring authentication or user interaction, but the complexity of crafting a successful exploit is high due to the nature of the component and the required manipulation. The affected firmware versions include Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. Despite early notification, the vendor has not issued any patches or advisories, leaving devices exposed. The CVSS 4.0 vector indicates network attack vector with high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually but combined to a medium severity score of 6.3. No known exploits have been observed in the wild yet, but public disclosure increases the risk of exploitation attempts.

Potential Impact

For European organizations, the impact of this SSRF vulnerability could be significant, especially in environments where Furbo 360 or Furbo Mini devices are deployed within corporate or home networks. SSRF can allow attackers to pivot from the compromised device into internal network segments, potentially accessing sensitive internal services, databases, or management interfaces that are not exposed externally. This can lead to unauthorized data disclosure, internal reconnaissance, or further exploitation of internal vulnerabilities. Given that these devices are often connected to home or office networks, they can serve as a foothold for attackers targeting employees or executives. The lack of vendor response and patches increases the risk exposure. While the direct impact on availability is low, the confidentiality and integrity of internal systems could be compromised. Organizations with remote or hybrid work setups using these devices should be particularly cautious. The medium severity rating suggests that while exploitation is not trivial, the potential for lateral movement and data exposure warrants attention.

Mitigation Recommendations

Since no patches are currently available from the vendor, European organizations should implement compensating controls to mitigate risk. These include segmenting IoT devices like Furbo cameras on isolated VLANs or separate network segments with strict firewall rules preventing these devices from initiating arbitrary outbound requests to internal network resources. Network monitoring should be enhanced to detect unusual outbound traffic patterns from these devices. Employing network-level access controls and DNS filtering can help block malicious SSRF attempts. Organizations should also consider disabling or limiting remote access features of these devices if not strictly necessary. Regularly auditing device firmware versions and monitoring vendor communications for updates is critical. If possible, replacing vulnerable devices with alternatives that have better security support should be considered. Finally, educating users about the risks of IoT devices and enforcing strong network segmentation policies will reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T18:33:09.439Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ec27b2152e6fbe60df9308

Added to database: 10/12/2025, 10:12:02 PM

Last enriched: 10/12/2025, 10:12:24 PM

Last updated: 10/13/2025, 12:35:20 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats