Tomofun Furbo 360/Furbo Mini Bluetooth ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Tomofun Furbo 360 and Furbo Mini keessatti argameera. Miidhamni argame is hojii hin beekamne kutaa Bluetooth Handler keessa. Wanti jijjiirame gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-404 si geessa. Dogoggorri 05/15/2025 irratti mul’ate. Odeeffannoon kun yeroo 10/11/2025 maxxanfameera kan maxxansiise Calvin Star, Julian B (skelet4r and dead1nfluence) waliin Software Secured. Dogoggorri kun CVE-2025-11638 jedhamee waamama. Weerara kanaaf milkaa'ina argachuuf, networkii naannoo irratti argamuu qabda. Ibsa teeknikaa hin jiru. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Hanqinni kun guyyoota 148 caalaa akka zero-day kan ummataaf hin ifneetti fayyadamee ture. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

7 ଆଡାପ୍ଟେସନ୍ · 116 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 2/6
10/12/2025 08:18 PM
ଅଦ୍ୟତନ 3/6
10/16/2025 07:41 AM
ଅଦ୍ୟତନ 4/6
10/16/2025 07:42 AM
ଅଦ୍ୟତନ 5/6
10/16/2025 07:44 AM
ଅଦ୍ୟତନ 6/6
10/31/2025 05:43 AM
software_vendorTomofunTomofunTomofunTomofunTomofun
software_nameFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo Mini
software_componentBluetooth HandlerBluetooth HandlerBluetooth HandlerBluetooth HandlerBluetooth Handler
vulnerability_cweCWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk11111
cvss3_vuldb_avAAAAA
cvss3_vuldb_acLLLLL
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
source_cveCVE-2025-11638CVE-2025-11638CVE-2025-11638CVE-2025-11638CVE-2025-11638
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
decision_summaryThe firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.
cvss2_vuldb_avAAAAA
cvss2_vuldb_acLLLLL
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss4_vuldb_avAAAAA
cvss4_vuldb_acLLLLL
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss2_vuldb_eNDNDNDPOCPOC
cvss2_vuldb_rlNDNDNDNDND
cvss2_vuldb_rcNDNDNDNDND
cvss3_vuldb_eXXXPP
cvss3_vuldb_rlXXXXX
cvss3_vuldb_rcXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss4_vuldb_eXXXXX
cvss2_vuldb_basescore3.33.33.33.33.3
cvss2_vuldb_tempscore3.33.33.33.33.0
cvss3_vuldb_basescore4.34.34.34.34.3
cvss3_vuldb_tempscore4.34.34.34.14.1
cvss3_meta_basescore4.34.34.34.35.0
cvss3_meta_tempscore4.34.34.34.25.0
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore5.35.35.32.12.1
advisory_date1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-33903EUVD-2025-33903EUVD-2025-33903EUVD-2025-33903EUVD-2025-33903
cvss3_cna_acLLLLL
cvss3_cna_prNNNNN
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cNNNNN
cvss3_cna_iNNNNN
cvss3_cna_aLLLLL
cvss3_cna_basescore4.34.34.34.34.3
cvss2_cna_avAAAAA
cvss2_cna_acLLLLL
cvss2_cna_auNNNNN
cvss2_cna_ciNNNNN
cvss2_cna_iiNNNNN
cvss2_cna_aiPPPPP
cvss2_cna_basescore3.33.33.33.33.3
cve_nvd_summaryA flaw has been found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Bluetooth Handler. Executing manipulation can lead to denial of service. The attacker needs to be present on the local network. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Bluetooth Handler. Executing manipulation can lead to denial of service. The attacker needs to be present on the local network. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Bluetooth Handler. Executing manipulation can lead to denial of service. The attacker needs to be present on the local network. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Bluetooth Handler. Executing manipulation can lead to denial of service. The attacker needs to be present on the local network. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Bluetooth Handler. Executing manipulation can lead to denial of service. The attacker needs to be present on the local network. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avAAAAA
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prNNNNN
cvss4_cna_uiNNNNN
cvss4_cna_vcNNNNN
cvss4_cna_viNNNNN
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore5.35.35.35.35.3
cvss3_cna_avAAAAA
developer_nicknamedead1nfluencedead1nfluencedead1nfluencedead1nfluence
advisory_disputed0000
exploit_publicity0000
person_nameCalvin Star/Julian BCalvin Star/Julian BCalvin Star/Julian BCalvin Star/Julian B
developer_nameJulian BJulian BJulian BJulian B
vulnerability_historic0000
exploit_freeformen1. Create a basic python script utilizing bleak in order to connect to devices over BLE and interact with exposed GATT characteristics 2. Run the script and connect to the Furbo 3. Write data to the exposed characteristic 4. Observer the Furbo status light change and become unusable until restarted1. Create a basic python script utilizing bleak in order to connect to devices over BLE and interact with exposed GATT characteristics 2. Run the script and connect to the Furbo 3. Write data to the exposed characteristic 4. Observer the Furbo status light change and become unusable until restarted1. Create a basic python script utilizing bleak in order to connect to devices over BLE and interact with exposed GATT characteristics 2. Run the script and connect to the Furbo 3. Write data to the exposed characteristic 4. Observer the Furbo status light change and become unusable until restarted1. Create a basic python script utilizing bleak in order to connect to devices over BLE and interact with exposed GATT characteristics 2. Run the script and connect to the Furbo 3. Write data to the exposed characteristic 4. Observer the Furbo status light change and become unusable until restarted
software_typeFirmware SoftwareFirmware SoftwareFirmware SoftwareFirmware Software
advisory_falsepositive0000
advisory_confirm_date1751509800 (07/03/2025)1751509800 (07/03/2025)1751509800 (07/03/2025)1751509800 (07/03/2025)
advisory_freeformenAn attacker within Bluetooth range of a Furbo device can connect to the device and issues a command to an exposed GATT characteristic. This command can put the Furbo device into a soft reset state where it will disconnect from it's associated WiFi network and only reconnect after being power cycled manually.An attacker within Bluetooth range of a Furbo device can connect to the device and issues a command to an exposed GATT characteristic. This command can put the Furbo device into a soft reset state where it will disconnect from it's associated WiFi network and only reconnect after being power cycled manually.An attacker within Bluetooth range of a Furbo device can connect to the device and issues a command to an exposed GATT characteristic. This command can put the Furbo device into a soft reset state where it will disconnect from it's associated WiFi network and only reconnect after being power cycled manually.An attacker within Bluetooth range of a Furbo device can connect to the device and issues a command to an exposed GATT characteristic. This command can put the Furbo device into a soft reset state where it will disconnect from it's associated WiFi network and only reconnect after being power cycled manually.
exploit_availability1111
company_nameSoftware SecuredSoftware SecuredSoftware SecuredSoftware Secured
person_nicknameskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluence
exploit_languagePythonPythonPython
vulnerability_discoverydate1747332000 (05/15/2025)1747332000 (05/15/2025)1747332000 (05/15/2025)
vulnerability_vendorinformdate1750539600 (06/21/2025)1750539600 (06/21/2025)1750539600 (06/21/2025)
company_websitehttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/blog
cvss3_nvd_avA
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss3_nvd_basescore6.5

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!