CVE-2025-11635

4.3 MEDIUM

📋 TL;DR

The Tomofun Furbo 360 pet camera has a file upload vulnerability that allows attackers to cause resource consumption (denial of service) through remote exploitation. This affects all devices running firmware up to version FB0035_FW_036. The vulnerability is in the file upload component, though specific details are limited.

💻 Affected Systems

Products:
  • Tomofun Furbo 360
Versions: All versions up to FB0035_FW_036
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with vulnerable firmware are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device unavailability due to resource exhaustion, potentially requiring physical reset or factory restoration.

🟠

Likely Case

Temporary service degradation or device unresponsiveness until resource consumption subsides.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring in place.

🌐 Internet-Facing: HIGH - Remote exploitation is possible, making internet-facing devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal network access still allows exploitation, though attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Specific exploitation details are not publicly available. The vulnerability requires understanding of the file upload mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware newer than FB0035_FW_036

Vendor Advisory: Not available - vendor did not respond to disclosure

Restart Required: Yes

Instructions:

1. Check current firmware version in Furbo app. 2. If version is FB0035_FW_036 or older, update to latest firmware through the Furbo app. 3. Restart device after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Furbo devices on separate VLAN or network segment to limit attack surface

Disable Remote Access

all

Turn off internet connectivity for the device if local-only operation is acceptable

🧯 If You Can't Patch

  • Monitor device resource usage and responsiveness for signs of attack
  • Implement strict firewall rules to limit connections to the device

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Furbo mobile app under device settings. If version is FB0035_FW_036 or lower, device is vulnerable.

Check Version:

Not applicable - version check only available through Furbo mobile app interface

Verify Fix Applied:

Confirm firmware version in Furbo app shows version newer than FB0035_FW_036.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity
  • Device resource exhaustion alerts
  • Multiple failed connection attempts

Network Indicators:

  • Abnormal traffic patterns to device file upload endpoints
  • Unusual volume of small file uploads

SIEM Query:

Not available - specific endpoint patterns not disclosed

🔗 References

📤 Share & Export