CVE-2025-11637

4.3 MEDIUM

📋 TL;DR

A race condition vulnerability exists in the Audio Handler component of Tomofun Furbo 360 devices up to firmware version FB0035_FW_036. This allows remote attackers to potentially manipulate audio functions through timing-based attacks. All users of affected Furbo 360 pet cameras with vulnerable firmware are impacted.

💻 Affected Systems

Products:
  • Tomofun Furbo 360
Versions: Up to firmware version FB0035_FW_036
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running vulnerable firmware versions are affected. The specific Audio Handler function impacted is unknown.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains unauthorized access to audio functions, potentially enabling eavesdropping, denial of service, or manipulation of device audio features.

🟠

Likely Case

Audio functionality disruption or unexpected behavior during concurrent audio operations, potentially affecting device reliability.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to trusted networks only.

🌐 Internet-Facing: HIGH - Attack can be carried out remotely without authentication, making internet-exposed devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal network exposure still presents risk from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Race condition exploitation requires precise timing and may be challenging to execute reliably. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version after FB0035_FW_036

Vendor Advisory: No vendor advisory available - vendor did not respond to disclosure

Restart Required: No

Instructions:

1. Check current firmware version in Furbo app settings. 2. If version is FB0035_FW_036 or earlier, update to latest firmware via the Furbo mobile app. 3. Verify update completes successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Furbo devices on separate VLAN or network segment to limit attack surface

Disable Remote Access

all

Limit device access to local network only if remote features are not required

🧯 If You Can't Patch

  • Segment device on isolated network with strict firewall rules
  • Monitor network traffic to/from device for unusual audio-related patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Furbo mobile app: Settings > Device Info > Firmware Version. If version is FB0035_FW_036 or lower, device is vulnerable.

Check Version:

No CLI command available - check via Furbo mobile app interface

Verify Fix Applied:

After updating, verify firmware version shows higher than FB0035_FW_036 in the Furbo app settings.

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid audio function calls
  • Audio handler error messages
  • Unexpected audio state changes

Network Indicators:

  • Unusual timing patterns in audio-related network traffic
  • Multiple concurrent connections to audio ports

SIEM Query:

No specific SIEM query available due to proprietary nature of device logging

🔗 References

📤 Share & Export