CVE-2025-11643

A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.328054 Permissions Required VDB Entry
https://vuldb.com/?id.328054 Third Party Advisory VDB Entry
https://vuldb.com/?submit.661875 Third Party Advisory VDB Entry
https://vuldb.com/?submit.661875 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:furbo:furbo_mini_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:furbo:furbo_mini:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:furbo:furbo_360_dog_camera_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:furbo:furbo_360_dog_camera:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-10-12 20:15

Updated : 2025-10-29 13:47


NVD link : CVE-2025-11643

Mitre link : CVE-2025-11643

CVE.ORG link : CVE-2025-11643


JSON object : View

Products Affected

furbo

  • furbo_360_dog_camera_firmware
  • furbo_mini_firmware
  • furbo_mini
  • furbo_360_dog_camera
CWE
CWE-259

Use of Hard-coded Password

CWE-798

Use of Hard-coded Credentials