Tomofun Furbo 360/Furbo Mini MQTT Client Certificate /squashfs-root/furbo_img ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame Tomofun Furbo 360 and Furbo Mini keessatti argameera. Miidhaan irra gahe is hojii hin beekamne faayilii /squashfs-root/furbo_img keessa kutaa MQTT Client Certificate keessa. Dhugumatti jijjiirraa gara ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-798 si geessa. Dogoggorri 05/15/2025 irratti adda bahe. Beekumsi kun yeroo 10/11/2025 ifoomsifameera kan ifoomsise Calvin Star, Julian B (skelet4r and dead1nfluence) waliin Software Secured. Dogoggorri kun maqaa CVE-2025-11643 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Hanqinni kun guyyoota 148 ol tajaajila zero-day kan hin beekkaminitti fayyadamee ture. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Once again VulDB remains the best source for vulnerability data.

6 ଆଡାପ୍ଟେସନ୍ · 117 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
10/12/2025 10:51 PM
ଅଦ୍ୟତନ 2/5
10/12/2025 11:14 PM
ଅଦ୍ୟତନ 3/5
10/18/2025 09:14 AM
ଅଦ୍ୟତନ 4/5
10/18/2025 09:17 AM
ଅଦ୍ୟତନ 5/5
10/29/2025 09:36 PM
software_vendorTomofunTomofunTomofunTomofunTomofun
software_nameFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo Mini
software_componentMQTT Client CertificateMQTT Client CertificateMQTT Client CertificateMQTT Client CertificateMQTT Client Certificate
software_file/squashfs-root/furbo_img/squashfs-root/furbo_img/squashfs-root/furbo_img/squashfs-root/furbo_img/squashfs-root/furbo_img
vulnerability_cweCWE-798 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-798 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-798 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-798 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-798 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acHHHHH
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
source_cveCVE-2025-11643CVE-2025-11643CVE-2025-11643CVE-2025-11643CVE-2025-11643
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
decision_summaryThe firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.
cvss2_vuldb_avNNNNN
cvss2_vuldb_acHHHHH
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss4_vuldb_avNNNNN
cvss4_vuldb_acHHHHH
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss2_vuldb_eNDNDNDPOCPOC
cvss2_vuldb_rlNDNDNDNDND
cvss2_vuldb_rcNDNDNDNDND
cvss3_vuldb_eXXXPP
cvss3_vuldb_rlXXXXX
cvss3_vuldb_rcXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss4_vuldb_eXXXXX
cvss2_vuldb_basescore2.62.62.62.62.6
cvss2_vuldb_tempscore2.62.62.62.62.3
cvss3_vuldb_basescore3.73.73.73.73.7
cvss3_vuldb_tempscore3.73.73.73.53.5
cvss3_meta_basescore3.73.73.73.75.2
cvss3_meta_tempscore3.73.73.73.65.1
cvss4_vuldb_bscore6.36.36.36.36.3
cvss4_vuldb_btscore6.36.36.32.92.9
advisory_date1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-33906EUVD-2025-33906EUVD-2025-33906EUVD-2025-33906EUVD-2025-33906
cve_nvd_summaryA security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNN
cvss4_cna_acHHHH
cvss4_cna_atNNNN
cvss4_cna_prNNNN
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viLLLL
cvss4_cna_vaNNNN
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore6.36.36.36.3
cvss3_cna_avNNNN
cvss3_cna_acHHHH
cvss3_cna_prNNNN
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aNNNN
cvss3_cna_basescore3.73.73.73.7
cvss2_cna_avNNNN
cvss2_cna_acHHHH
cvss2_cna_auNNNN
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiNNNN
cvss2_cna_basescore2.62.62.62.6
company_websitehttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/blog
advisory_confirm_date1751509800 (07/03/2025)1751509800 (07/03/2025)1751509800 (07/03/2025)
advisory_disputed000
exploit_availability111
exploit_publicity000
advisory_freeformenAn attacker who retrieves and decrypts the Furbo firmware can impersonate any device and connect to Furbo's MQTT infrastructure as a client. As a result, the device IDs of all users can be retrieved, and an attacker can identify what is being performed with a device at a specific point in time.An attacker who retrieves and decrypts the Furbo firmware can impersonate any device and connect to Furbo's MQTT infrastructure as a client. As a result, the device IDs of all users can be retrieved, and an attacker can identify what is being performed with a device at a specific point in time.An attacker who retrieves and decrypts the Furbo firmware can impersonate any device and connect to Furbo's MQTT infrastructure as a client. As a result, the device IDs of all users can be retrieved, and an attacker can identify what is being performed with a device at a specific point in time.
developer_nicknamedead1nfluencedead1nfluencedead1nfluence
vulnerability_historic000
person_nameCalvin Star/Julian BCalvin Star/Julian BCalvin Star/Julian B
developer_nameJulian BJulian BJulian B
company_nameSoftware SecuredSoftware SecuredSoftware Secured
exploit_freeformenReplication Steps: 1. Retrieve the Furbo firmware, and decrypt it. 2. Decompress the firmware with binwalk. 3. Navigate to: /squashfs-root/furbo_img 4. Decompress the squash file. 5. Find the certificates located in: /_furbo_service-<SVC VERSION>.sqsh.extracted/squashfs-root/config/ 6. Utilize a tool like mosquitto_sub in order to connect to the MQTT service using the certificates 7. Observe that you are subscribed to the endpoint as a "Furbo device" and can observe actions from every other FurboReplication Steps: 1. Retrieve the Furbo firmware, and decrypt it. 2. Decompress the firmware with binwalk. 3. Navigate to: /squashfs-root/furbo_img 4. Decompress the squash file. 5. Find the certificates located in: /_furbo_service-<SVC VERSION>.sqsh.extracted/squashfs-root/config/ 6. Utilize a tool like mosquitto_sub in order to connect to the MQTT service using the certificates 7. Observe that you are subscribed to the endpoint as a "Furbo device" and can observe actions from every other FurboReplication Steps: 1. Retrieve the Furbo firmware, and decrypt it. 2. Decompress the firmware with binwalk. 3. Navigate to: /squashfs-root/furbo_img 4. Decompress the squash file. 5. Find the certificates located in: /_furbo_service-<SVC VERSION>.sqsh.extracted/squashfs-root/config/ 6. Utilize a tool like mosquitto_sub in order to connect to the MQTT service using the certificates 7. Observe that you are subscribed to the endpoint as a "Furbo device" and can observe actions from every other Furbo
vulnerability_discoverydate1747332000 (05/15/2025)1747332000 (05/15/2025)1747332000 (05/15/2025)
exploit_wormified000
software_typeFirmware SoftwareFirmware SoftwareFirmware Software
vulnerability_vendorinformdate1750539600 (06/21/2025)1750539600 (06/21/2025)1750539600 (06/21/2025)
person_nicknameskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluence
advisory_falsepositive000
cvss3_nvd_avN
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.1

Do you know our Splunk app?

Download it now for free!