CVE-2025-3653

7.3 HIGH

📋 TL;DR

The Petlibro Smart Pet Feeder Platform contains an improper access control vulnerability that allows attackers to manipulate any device by sending arbitrary serial numbers to device control APIs. This enables unauthorized feeding schedule changes, manual feed triggers, camera feed access, and device setting modifications. All users of Petlibro Smart Pet Feeder Platform versions up to 1.7.31 are affected.

💻 Affected Systems

Products:
  • Petlibro Smart Pet Feeder Platform
Versions: up to 1.7.31
Operating Systems: All platforms running the Petlibro platform
Default Config Vulnerable: ⚠️ Yes
Notes: All devices connected to the Petlibro platform are vulnerable regardless of specific feeder model.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could starve pets by disabling feeding schedules, overfeed pets causing health issues, access home camera feeds for surveillance, and permanently disable devices.

🟠

Likely Case

Attackers will change feeding schedules causing pet distress, trigger unnecessary manual feeds wasting food, and access camera feeds to monitor homes.

🟢

If Mitigated

With proper access controls, only authenticated device owners could control their specific devices, preventing unauthorized manipulation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only API endpoint knowledge and device serial numbers, which may be guessable or enumerable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

1. Monitor Petlibro for security updates. 2. Check for platform updates in device/app settings. 3. Apply any available updates immediately.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Petlibro devices on separate VLAN or network segment to limit attack surface

API Endpoint Blocking

all

Block external access to Petlibro API endpoints at firewall/network level

🧯 If You Can't Patch

  • Disconnect devices from internet and use local-only functionality if available
  • Monitor device logs for unauthorized API calls and feeding schedule changes

🔍 How to Verify

Check if Vulnerable:

Check Petlibro platform/app version. If version is 1.7.31 or lower, device is vulnerable.

Check Version:

Check version in Petlibro mobile app settings or device management interface

Verify Fix Applied:

Verify platform version is above 1.7.31 and test API endpoints require proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls to device control endpoints
  • Feeding schedule changes from unknown IPs
  • Multiple failed authentication attempts followed by successful device control

Network Indicators:

  • External IPs accessing device control APIs
  • Unusual patterns of API requests to /api/device/* endpoints
  • Requests containing serial number parameters without authentication tokens

SIEM Query:

source_ip NOT IN (trusted_ips) AND (uri_path CONTAINS '/api/device/' OR uri_path CONTAINS '/control/') AND http_method IN ('POST', 'PUT')

🔗 References

📤 Share & Export