Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3654: Improper Authorization of Index Containing Sensitive Information in Petlibrio Smart Pet Feeder Platform

0
Medium
VulnerabilityCVE-2025-3654cvecve-2025-3654
Published: Sat Jan 03 2026 (01/03/2026, 23:33:04 UTC)
Source: CVE Database V5
Vendor/Project: Petlibrio
Product: Smart Pet Feeder Platform

Description

CVE-2025-3654 is an information disclosure vulnerability in the Petlibro Smart Pet Feeder Platform up to version 1. 7. 31. It allows unauthorized attackers to access sensitive device hardware information, including serial numbers and MAC addresses, via insecure API endpoints without authentication. Exploiting the /device/devicePetRelation/getBoundDevices API with pet IDs enables attackers to gather data that could lead to full device control. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. No known exploits are currently reported in the wild. This flaw compromises confidentiality and could facilitate further attacks on the device or network.

AI-Powered Analysis

AILast updated: 01/11/2026, 21:27:43 UTC

Technical Analysis

CVE-2025-3654 identifies an improper authorization vulnerability in the Petlibro Smart Pet Feeder Platform, specifically in versions up to 1.7.31. The vulnerability arises from insecure API endpoints that do not enforce proper access controls, allowing unauthenticated attackers to query the /device/devicePetRelation/getBoundDevices endpoint using pet IDs. This API call returns sensitive device hardware information, including device serial numbers and MAC addresses. Such information disclosure can be leveraged by attackers to fingerprint devices, bypass security controls, or escalate privileges to gain full control over the smart pet feeder. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making it accessible remotely. The CVSS 4.0 base score of 6.9 reflects a medium severity level, primarily due to the lack of direct integrity or availability impact but significant confidentiality compromise. No patches or exploits are currently publicly available, but the risk remains due to the sensitive nature of the data exposed and the potential for subsequent exploitation. The platform’s widespread use in IoT pet care devices increases the attack surface, especially in environments where these devices are connected to home or enterprise networks.

Potential Impact

For European organizations, the impact of this vulnerability includes unauthorized disclosure of device-specific information that can be used to facilitate further attacks such as device takeover or lateral movement within networks. In sectors like smart home services, veterinary clinics, or pet care businesses utilizing Petlibro devices, this could lead to privacy breaches or operational disruptions. The exposure of MAC addresses and serial numbers can aid attackers in bypassing network security measures or launching targeted attacks against IoT infrastructure. While the vulnerability itself does not directly compromise device integrity or availability, it significantly undermines confidentiality and could serve as a stepping stone for more severe attacks. Organizations with IoT deployments in Europe must consider the risk of unauthorized access to connected devices and the potential for data leakage or network infiltration. The lack of authentication and ease of exploitation increase the threat level in environments with insufficient network segmentation or monitoring.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if their Petlibro Smart Pet Feeder devices are running vulnerable versions (up to 1.7.31) and apply any vendor-released patches or firmware updates as soon as they become available. In the absence of patches, network-level controls should be implemented to restrict access to the vulnerable API endpoints, such as firewall rules limiting inbound traffic to trusted sources only. Employ network segmentation to isolate IoT devices from critical enterprise systems and sensitive data repositories. Monitor network traffic for unusual API requests targeting pet feeder devices and implement anomaly detection to identify potential exploitation attempts. Additionally, enforce strong authentication and authorization mechanisms on IoT management platforms and APIs wherever possible. Regularly audit IoT device configurations and update device credentials to reduce the risk of unauthorized access. Finally, engage with the vendor for security advisories and consider alternative devices if timely remediation is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T18:53:39.026Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6959a9dfdb813ff03e731ca7

Added to database: 1/3/2026, 11:44:31 PM

Last enriched: 1/11/2026, 9:27:43 PM

Last updated: 2/5/2026, 3:17:58 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats