CVE-2025-3654: Improper Authorization of Index Containing Sensitive Information in Petlibrio Smart Pet Feeder Platform
CVE-2025-3654 is an information disclosure vulnerability in the Petlibro Smart Pet Feeder Platform up to version 1. 7. 31. It allows unauthorized attackers to access sensitive device hardware information, including serial numbers and MAC addresses, via insecure API endpoints without authentication. Exploiting the /device/devicePetRelation/getBoundDevices API with pet IDs enables attackers to gather data that could lead to full device control. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. No known exploits are currently reported in the wild. This flaw compromises confidentiality and could facilitate further attacks on the device or network.
AI Analysis
Technical Summary
CVE-2025-3654 identifies an improper authorization vulnerability in the Petlibro Smart Pet Feeder Platform, specifically in versions up to 1.7.31. The vulnerability arises from insecure API endpoints that do not enforce proper access controls, allowing unauthenticated attackers to query the /device/devicePetRelation/getBoundDevices endpoint using pet IDs. This API call returns sensitive device hardware information, including device serial numbers and MAC addresses. Such information disclosure can be leveraged by attackers to fingerprint devices, bypass security controls, or escalate privileges to gain full control over the smart pet feeder. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making it accessible remotely. The CVSS 4.0 base score of 6.9 reflects a medium severity level, primarily due to the lack of direct integrity or availability impact but significant confidentiality compromise. No patches or exploits are currently publicly available, but the risk remains due to the sensitive nature of the data exposed and the potential for subsequent exploitation. The platform’s widespread use in IoT pet care devices increases the attack surface, especially in environments where these devices are connected to home or enterprise networks.
Potential Impact
For European organizations, the impact of this vulnerability includes unauthorized disclosure of device-specific information that can be used to facilitate further attacks such as device takeover or lateral movement within networks. In sectors like smart home services, veterinary clinics, or pet care businesses utilizing Petlibro devices, this could lead to privacy breaches or operational disruptions. The exposure of MAC addresses and serial numbers can aid attackers in bypassing network security measures or launching targeted attacks against IoT infrastructure. While the vulnerability itself does not directly compromise device integrity or availability, it significantly undermines confidentiality and could serve as a stepping stone for more severe attacks. Organizations with IoT deployments in Europe must consider the risk of unauthorized access to connected devices and the potential for data leakage or network infiltration. The lack of authentication and ease of exploitation increase the threat level in environments with insufficient network segmentation or monitoring.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if their Petlibro Smart Pet Feeder devices are running vulnerable versions (up to 1.7.31) and apply any vendor-released patches or firmware updates as soon as they become available. In the absence of patches, network-level controls should be implemented to restrict access to the vulnerable API endpoints, such as firewall rules limiting inbound traffic to trusted sources only. Employ network segmentation to isolate IoT devices from critical enterprise systems and sensitive data repositories. Monitor network traffic for unusual API requests targeting pet feeder devices and implement anomaly detection to identify potential exploitation attempts. Additionally, enforce strong authentication and authorization mechanisms on IoT management platforms and APIs wherever possible. Regularly audit IoT device configurations and update device credentials to reduce the risk of unauthorized access. Finally, engage with the vendor for security advisories and consider alternative devices if timely remediation is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-3654: Improper Authorization of Index Containing Sensitive Information in Petlibrio Smart Pet Feeder Platform
Description
CVE-2025-3654 is an information disclosure vulnerability in the Petlibro Smart Pet Feeder Platform up to version 1. 7. 31. It allows unauthorized attackers to access sensitive device hardware information, including serial numbers and MAC addresses, via insecure API endpoints without authentication. Exploiting the /device/devicePetRelation/getBoundDevices API with pet IDs enables attackers to gather data that could lead to full device control. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. No known exploits are currently reported in the wild. This flaw compromises confidentiality and could facilitate further attacks on the device or network.
AI-Powered Analysis
Technical Analysis
CVE-2025-3654 identifies an improper authorization vulnerability in the Petlibro Smart Pet Feeder Platform, specifically in versions up to 1.7.31. The vulnerability arises from insecure API endpoints that do not enforce proper access controls, allowing unauthenticated attackers to query the /device/devicePetRelation/getBoundDevices endpoint using pet IDs. This API call returns sensitive device hardware information, including device serial numbers and MAC addresses. Such information disclosure can be leveraged by attackers to fingerprint devices, bypass security controls, or escalate privileges to gain full control over the smart pet feeder. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making it accessible remotely. The CVSS 4.0 base score of 6.9 reflects a medium severity level, primarily due to the lack of direct integrity or availability impact but significant confidentiality compromise. No patches or exploits are currently publicly available, but the risk remains due to the sensitive nature of the data exposed and the potential for subsequent exploitation. The platform’s widespread use in IoT pet care devices increases the attack surface, especially in environments where these devices are connected to home or enterprise networks.
Potential Impact
For European organizations, the impact of this vulnerability includes unauthorized disclosure of device-specific information that can be used to facilitate further attacks such as device takeover or lateral movement within networks. In sectors like smart home services, veterinary clinics, or pet care businesses utilizing Petlibro devices, this could lead to privacy breaches or operational disruptions. The exposure of MAC addresses and serial numbers can aid attackers in bypassing network security measures or launching targeted attacks against IoT infrastructure. While the vulnerability itself does not directly compromise device integrity or availability, it significantly undermines confidentiality and could serve as a stepping stone for more severe attacks. Organizations with IoT deployments in Europe must consider the risk of unauthorized access to connected devices and the potential for data leakage or network infiltration. The lack of authentication and ease of exploitation increase the threat level in environments with insufficient network segmentation or monitoring.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if their Petlibro Smart Pet Feeder devices are running vulnerable versions (up to 1.7.31) and apply any vendor-released patches or firmware updates as soon as they become available. In the absence of patches, network-level controls should be implemented to restrict access to the vulnerable API endpoints, such as firewall rules limiting inbound traffic to trusted sources only. Employ network segmentation to isolate IoT devices from critical enterprise systems and sensitive data repositories. Monitor network traffic for unusual API requests targeting pet feeder devices and implement anomaly detection to identify potential exploitation attempts. Additionally, enforce strong authentication and authorization mechanisms on IoT management platforms and APIs wherever possible. Regularly audit IoT device configurations and update device credentials to reduce the risk of unauthorized access. Finally, engage with the vendor for security advisories and consider alternative devices if timely remediation is not feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T18:53:39.026Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6959a9dfdb813ff03e731ca7
Added to database: 1/3/2026, 11:44:31 PM
Last enriched: 1/11/2026, 9:27:43 PM
Last updated: 2/5/2026, 3:17:58 PM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Substack Discloses Security Incident After Hacker Leaks Data
MediumCVE-2025-14150: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM webMethods Integration (on prem) - Integration Server
MediumCVE-2025-13491: CWE-426 Untrusted Search Path in IBM App Connect Operator
MediumCVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.