CVE-2025-11636

5.6 MEDIUM

📋 TL;DR

This CVE describes a server-side request forgery (SSRF) vulnerability in Tomofun Furbo 360 pet cameras up to firmware version FB0035_FW_036. Attackers can exploit the Account Handler component to make the device send unauthorized requests to internal or external systems. All users of affected Furbo 360 devices with vulnerable firmware are impacted.

💻 Affected Systems

Products:
  • Tomofun Furbo 360
Versions: Up to firmware version FB0035_FW_036
Operating Systems: Embedded IoT firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running vulnerable firmware versions are affected. The vulnerability is in the Account Handler component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could use the device as a proxy to attack internal network services, potentially accessing sensitive internal systems, exfiltrating data, or performing lateral movement within the network.

🟠

Likely Case

Attackers could use the device to scan internal networks, access metadata services, or interact with internal APIs that shouldn't be exposed externally.

🟢

If Mitigated

With proper network segmentation and egress filtering, the impact would be limited to the device itself and any directly accessible services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

The vulnerability requires remote access and is described as high complexity/difficult to exploit. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware newer than FB0035_FW_036

Vendor Advisory: Not provided by vendor (vendor did not respond to disclosure)

Restart Required: No

Instructions:

1. Check current firmware version in Furbo app. 2. If version is FB0035_FW_036 or older, update to latest firmware through the Furbo mobile app. 3. Verify update completes successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Furbo devices on a separate VLAN or network segment to limit potential lateral movement.

Egress Filtering

all

Implement firewall rules to restrict outbound connections from Furbo devices to only necessary services.

🧯 If You Can't Patch

  • Segment the Furbo device on an isolated network with strict egress filtering
  • Monitor network traffic from the device for unusual outbound connections

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Furbo mobile app under Device Settings > Firmware Version. If version is FB0035_FW_036 or lower, device is vulnerable.

Check Version:

Check via Furbo mobile app: Device Settings > Firmware Version

Verify Fix Applied:

After updating, verify firmware version shows a version newer than FB0035_FW_036 in the Furbo app.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from Furbo device IP
  • Requests to internal IP ranges or metadata services from device

Network Indicators:

  • HTTP requests from Furbo device to unexpected internal or external endpoints
  • Traffic patterns suggesting port scanning from device

SIEM Query:

source_ip="[FURBO_DEVICE_IP]" AND (dest_ip=~"10.*|172.16.*|192.168.*|169.254.169.254" OR dest_port<1024)

🔗 References

📤 Share & Export