CVE-2025-11648

5.6 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Tomofun Furbo 360 and Furbo Mini pet cameras via their GATT Interface URL Handler. Attackers can potentially make the device's internal services send requests to arbitrary URLs, which could lead to information disclosure or further attacks. All users with affected firmware versions are vulnerable.

💻 Affected Systems

Products:
  • Tomofun Furbo 360
  • Tomofun Furbo Mini
Versions: Furbo 360 up to FB0035_FW_036, Furbo Mini up to MC0020_FW_074
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires Bluetooth Low Energy (BLE) proximity for initial access to the GATT interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could use the SSRF to access internal services, potentially retrieving sensitive data, scanning internal networks, or chaining with other vulnerabilities to achieve remote code execution.

🟠

Likely Case

Information disclosure from internal services, limited internal network scanning, or denial of service by exhausting device resources.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact would be limited to the device itself with minimal data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires BLE access to the device and manipulation of the TF_FQDN.json file via the GATT interface. The vendor did not respond to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor unresponsive

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor Tomofun's official channels for firmware updates.

🔧 Temporary Workarounds

Disable Bluetooth when not needed

all

Turn off Bluetooth on the Furbo device when not actively using BLE features to prevent initial attack vector

Use Furbo mobile app settings to disable Bluetooth connectivity

Network segmentation

all

Place Furbo devices on isolated network segments to limit SSRF impact

🧯 If You Can't Patch

  • Physically isolate Furbo devices from sensitive internal networks
  • Implement strict firewall rules blocking outbound requests from Furbo devices except to required services

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Furbo mobile app: Settings > Device Info > Firmware Version

Check Version:

No CLI command - use Furbo mobile app interface

Verify Fix Applied:

Verify firmware version is above FB0035_FW_036 for Furbo 360 or MC0020_FW_074 for Furbo Mini

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Furbo device IPs
  • BLE connection attempts from unauthorized devices

Network Indicators:

  • HTTP requests from Furbo devices to unexpected internal/external endpoints
  • Unusual BLE traffic patterns

SIEM Query:

source_ip="Furbo_device_IP" AND (http_request OR destination_port=80 OR destination_port=443) NOT destination_ip="expected_services"

🔗 References

📤 Share & Export