Tomofun Furbo 360/Furbo Mini MQTT Client Certificate /squashfs-root/furbo_img karkar ndiyamga taƙa

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Tomofun Furbo 360 and Furbo Mini. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /squashfs-root/furbo_img, a cikin sashen MQTT Client Certificate. A sa manipulation ka karkar ndiyamga taƙa. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-798. An gano matsalar a 05/15/2025. Hakika, rauni an bayyana shi 10/11/2025 daga Calvin Star, Julian B (skelet4r and dead1nfluence) tare da Software Secured. Wannan matsala ana saninta da CVE-2025-11643. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

6 Goyarwa · 117 Datenpunkte

FurɗeGargadi 1/5
10/12/2025 22:51
Gargadi 2/5
10/12/2025 23:14
Gargadi 3/5
10/18/2025 09:14
Gargadi 4/5
10/18/2025 09:17
Gargadi 5/5
10/29/2025 21:36
software_vendorTomofunTomofunTomofunTomofunTomofun
software_nameFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo Mini
software_componentMQTT Client CertificateMQTT Client CertificateMQTT Client CertificateMQTT Client CertificateMQTT Client Certificate
software_file/squashfs-root/furbo_img/squashfs-root/furbo_img/squashfs-root/furbo_img/squashfs-root/furbo_img/squashfs-root/furbo_img
vulnerability_cweCWE-798 (karkar ndiyamga taƙa)CWE-798 (karkar ndiyamga taƙa)CWE-798 (karkar ndiyamga taƙa)CWE-798 (karkar ndiyamga taƙa)CWE-798 (karkar ndiyamga taƙa)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acHHHHH
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
source_cveCVE-2025-11643CVE-2025-11643CVE-2025-11643CVE-2025-11643CVE-2025-11643
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
decision_summaryThe firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.
cvss2_vuldb_avNNNNN
cvss2_vuldb_acHHHHH
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss4_vuldb_avNNNNN
cvss4_vuldb_acHHHHH
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss2_vuldb_eNDNDNDPOCPOC
cvss2_vuldb_rlNDNDNDNDND
cvss2_vuldb_rcNDNDNDNDND
cvss3_vuldb_eXXXPP
cvss3_vuldb_rlXXXXX
cvss3_vuldb_rcXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss4_vuldb_eXXXXX
cvss2_vuldb_basescore2.62.62.62.62.6
cvss2_vuldb_tempscore2.62.62.62.62.3
cvss3_vuldb_basescore3.73.73.73.73.7
cvss3_vuldb_tempscore3.73.73.73.53.5
cvss3_meta_basescore3.73.73.73.75.2
cvss3_meta_tempscore3.73.73.73.65.1
cvss4_vuldb_bscore6.36.36.36.36.3
cvss4_vuldb_btscore6.36.36.32.92.9
advisory_date1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-33906EUVD-2025-33906EUVD-2025-33906EUVD-2025-33906EUVD-2025-33906
cve_nvd_summaryA security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNN
cvss4_cna_acHHHH
cvss4_cna_atNNNN
cvss4_cna_prNNNN
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viLLLL
cvss4_cna_vaNNNN
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore6.36.36.36.3
cvss3_cna_avNNNN
cvss3_cna_acHHHH
cvss3_cna_prNNNN
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aNNNN
cvss3_cna_basescore3.73.73.73.7
cvss2_cna_avNNNN
cvss2_cna_acHHHH
cvss2_cna_auNNNN
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiNNNN
cvss2_cna_basescore2.62.62.62.6
company_websitehttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/blog
advisory_confirm_date1751509800 (07/03/2025)1751509800 (07/03/2025)1751509800 (07/03/2025)
advisory_disputed000
exploit_availability111
exploit_publicity000
advisory_freeformenAn attacker who retrieves and decrypts the Furbo firmware can impersonate any device and connect to Furbo's MQTT infrastructure as a client. As a result, the device IDs of all users can be retrieved, and an attacker can identify what is being performed with a device at a specific point in time.An attacker who retrieves and decrypts the Furbo firmware can impersonate any device and connect to Furbo's MQTT infrastructure as a client. As a result, the device IDs of all users can be retrieved, and an attacker can identify what is being performed with a device at a specific point in time.An attacker who retrieves and decrypts the Furbo firmware can impersonate any device and connect to Furbo's MQTT infrastructure as a client. As a result, the device IDs of all users can be retrieved, and an attacker can identify what is being performed with a device at a specific point in time.
developer_nicknamedead1nfluencedead1nfluencedead1nfluence
vulnerability_historic000
person_nameCalvin Star/Julian BCalvin Star/Julian BCalvin Star/Julian B
developer_nameJulian BJulian BJulian B
company_nameSoftware SecuredSoftware SecuredSoftware Secured
exploit_freeformenReplication Steps: 1. Retrieve the Furbo firmware, and decrypt it. 2. Decompress the firmware with binwalk. 3. Navigate to: /squashfs-root/furbo_img 4. Decompress the squash file. 5. Find the certificates located in: /_furbo_service-<SVC VERSION>.sqsh.extracted/squashfs-root/config/ 6. Utilize a tool like mosquitto_sub in order to connect to the MQTT service using the certificates 7. Observe that you are subscribed to the endpoint as a "Furbo device" and can observe actions from every other FurboReplication Steps: 1. Retrieve the Furbo firmware, and decrypt it. 2. Decompress the firmware with binwalk. 3. Navigate to: /squashfs-root/furbo_img 4. Decompress the squash file. 5. Find the certificates located in: /_furbo_service-<SVC VERSION>.sqsh.extracted/squashfs-root/config/ 6. Utilize a tool like mosquitto_sub in order to connect to the MQTT service using the certificates 7. Observe that you are subscribed to the endpoint as a "Furbo device" and can observe actions from every other FurboReplication Steps: 1. Retrieve the Furbo firmware, and decrypt it. 2. Decompress the firmware with binwalk. 3. Navigate to: /squashfs-root/furbo_img 4. Decompress the squash file. 5. Find the certificates located in: /_furbo_service-<SVC VERSION>.sqsh.extracted/squashfs-root/config/ 6. Utilize a tool like mosquitto_sub in order to connect to the MQTT service using the certificates 7. Observe that you are subscribed to the endpoint as a "Furbo device" and can observe actions from every other Furbo
vulnerability_discoverydate1747332000 (05/15/2025)1747332000 (05/15/2025)1747332000 (05/15/2025)
exploit_wormified000
software_typeFirmware SoftwareFirmware SoftwareFirmware Software
vulnerability_vendorinformdate1750539600 (06/21/2025)1750539600 (06/21/2025)1750539600 (06/21/2025)
person_nicknameskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluence
advisory_falsepositive000
cvss3_nvd_avN
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.1

Interested in the pricing of exploits?

See the underground prices here!