CVE-2025-3646

7.3 HIGH

📋 TL;DR

This authorization bypass vulnerability in Petlibro Smart Pet Feeder Platform allows unauthorized users to add themselves as shared owners to any device by exploiting missing permission checks in the device share API. Attackers can gain unauthorized access to devices and view owner information without proper authorization. All users of Petlibro Smart Pet Feeder Platform versions up to 1.7.31 are affected.

💻 Affected Systems

Products:
  • Petlibro Smart Pet Feeder Platform
Versions: Up to and including 1.7.31
Operating Systems: All platforms running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable software version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over all connected pet feeders, potentially disrupting feeding schedules, accessing owner personal information, and compromising the entire smart home ecosystem.

🟠

Likely Case

Unauthorized users gain access to specific pet feeders they shouldn't have access to, allowing them to view owner information and potentially modify feeding schedules.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to unauthorized viewing of device information without ability to modify critical functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending crafted requests to the device share API endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.32 or later

Vendor Advisory: https://bobdahacker.com/blog/petlibro

Restart Required: Yes

Instructions:

1. Check current version using the device management interface. 2. Update to version 1.7.32 or later through the official update mechanism. 3. Restart the device to apply the patch.

🔧 Temporary Workarounds

Network Isolation

all

Isolate Petlibro devices on a separate VLAN or network segment to limit exposure.

API Endpoint Blocking

linux

Block access to the device share API endpoint at the network perimeter.

iptables -A INPUT -p tcp --dport [API_PORT] -j DROP

🧯 If You Can't Patch

  • Disable device sharing functionality entirely if not required
  • Implement strict network access controls to limit who can communicate with the device API

🔍 How to Verify

Check if Vulnerable:

Check if your Petlibro device is running version 1.7.31 or earlier through the device management interface or mobile app.

Check Version:

Check through Petlibro mobile app or device web interface

Verify Fix Applied:

Verify the device is running version 1.7.32 or later and test that unauthorized users cannot add themselves as shared owners.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls to device share endpoints
  • Multiple failed authentication attempts followed by successful share operations

Network Indicators:

  • Unusual API requests to device share endpoints from unauthorized IP addresses
  • Traffic patterns showing share operations without preceding authentication

SIEM Query:

source="petlibro" AND (event="device_share" OR api_endpoint="/api/share") AND user="unknown" OR auth_status="failed"

🔗 References

📤 Share & Export