CVE-2025-11635
📋 TL;DR
The Tomofun Furbo 360 pet camera has a file upload vulnerability that allows attackers to cause resource consumption (denial of service) through remote exploitation. This affects all devices running firmware up to version FB0035_FW_036. The vulnerability is in the file upload component, though specific details are limited.
💻 Affected Systems
- Tomofun Furbo 360
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device unavailability due to resource exhaustion, potentially requiring physical reset or factory restoration.
Likely Case
Temporary service degradation or device unresponsiveness until resource consumption subsides.
If Mitigated
Minimal impact with proper network segmentation and monitoring in place.
🎯 Exploit Status
Specific exploitation details are not publicly available. The vulnerability requires understanding of the file upload mechanism.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware newer than FB0035_FW_036
Vendor Advisory: Not available - vendor did not respond to disclosure
Restart Required: Yes
Instructions:
1. Check current firmware version in Furbo app. 2. If version is FB0035_FW_036 or older, update to latest firmware through the Furbo app. 3. Restart device after update completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Furbo devices on separate VLAN or network segment to limit attack surface
Disable Remote Access
allTurn off internet connectivity for the device if local-only operation is acceptable
🧯 If You Can't Patch
- Monitor device resource usage and responsiveness for signs of attack
- Implement strict firewall rules to limit connections to the device
🔍 How to Verify
Check if Vulnerable:
Check firmware version in Furbo mobile app under device settings. If version is FB0035_FW_036 or lower, device is vulnerable.
Check Version:
Not applicable - version check only available through Furbo mobile app interface
Verify Fix Applied:
Confirm firmware version in Furbo app shows version newer than FB0035_FW_036.
📡 Detection & Monitoring
Log Indicators:
- Unusual file upload activity
- Device resource exhaustion alerts
- Multiple failed connection attempts
Network Indicators:
- Abnormal traffic patterns to device file upload endpoints
- Unusual volume of small file uploads
SIEM Query:
Not available - specific endpoint patterns not disclosed