A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md | Third Party Advisory Exploit |
| https://vuldb.com/?ctiid.328059 | Permissions Required VDB Entry |
| https://vuldb.com/?id.328059 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.662768 | Third Party Advisory VDB Entry |
| https://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-10-12 22:15
Updated : 2025-10-28 01:59
NVD link : CVE-2025-11648
Mitre link : CVE-2025-11648
CVE.ORG link : CVE-2025-11648
JSON object : View
Products Affected
furbo
- furbo_360_dog_camera_firmware
- furbo_mini_firmware
- furbo_mini
- furbo_360_dog_camera
CWE
CWE-918
Server-Side Request Forgery (SSRF)
