| ଫିଲ୍ଡ | ସୃଷ୍ଟି ହୋଇଛି 10/11/2025 08:38 PM | ଅଦ୍ୟତନ 1/3 10/12/2025 11:07 PM | ଅଦ୍ୟତନ 2/3 10/13/2025 12:19 AM | ଅଦ୍ୟତନ 3/3 10/18/2025 11:29 PM |
|---|
| software_vendor | Tomofun | Tomofun | Tomofun | Tomofun |
| software_name | Furbo Mobile App | Furbo Mobile App | Furbo Mobile App | Furbo Mobile App |
| software_version | <=7.57.0a | <=7.57.0a | <=7.57.0a | <=7.57.0a |
| software_platform | Android | Android | Android | Android |
| software_component | Authentication Token Handler | Authentication Token Handler | Authentication Token Handler | Authentication Token Handler |
| vulnerability_cwe | CWE-922 (ସୂଚନା ପ୍ରକାଶ) | CWE-922 (ସୂଚନା ପ୍ରକାଶ) | CWE-922 (ସୂଚନା ପ୍ରକାଶ) | CWE-922 (ସୂଚନା ପ୍ରକାଶ) |
| cvss3_vuldb_av | P | P | P | P |
| cvss3_vuldb_ac | L | L | L | L |
| cvss3_vuldb_pr | N | N | N | N |
| cvss3_vuldb_ui | N | N | N | N |
| cvss3_vuldb_s | U | U | U | U |
| cvss3_vuldb_c | L | L | L | L |
| cvss3_vuldb_i | N | N | N | N |
| cvss3_vuldb_a | N | N | N | N |
| cvss3_vuldb_e | P | P | P | P |
| cvss3_vuldb_rc | R | R | R | R |
| advisory_url | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md |
| exploit_availability | 1 | 1 | 1 | 1 |
| exploit_publicity | 1 | 1 | 1 | 1 |
| exploit_url | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md | https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure.md |
| source_cve | CVE-2025-11645 | CVE-2025-11645 | CVE-2025-11645 | CVE-2025-11645 |
| cna_responsible | VulDB | VulDB | VulDB | VulDB |
| response_summary | The vendor was contacted early about this disclosure but did not respond in any way. | The vendor was contacted early about this disclosure but did not respond in any way. | The vendor was contacted early about this disclosure but did not respond in any way. | The vendor was contacted early about this disclosure but did not respond in any way. |
| software_type | Android App Software | Android App Software | Android App Software | Android App Software |
| cvss2_vuldb_av | L | L | L | L |
| cvss2_vuldb_ac | L | L | L | L |
| cvss2_vuldb_au | N | N | N | N |
| cvss2_vuldb_ci | P | P | P | P |
| cvss2_vuldb_ii | N | N | N | N |
| cvss2_vuldb_ai | N | N | N | N |
| cvss2_vuldb_e | POC | POC | POC | POC |
| cvss2_vuldb_rc | UR | UR | UR | UR |
| cvss4_vuldb_av | P | P | P | P |
| cvss4_vuldb_ac | L | L | L | L |
| cvss4_vuldb_pr | N | N | N | N |
| cvss4_vuldb_ui | N | N | N | N |
| cvss4_vuldb_vc | L | L | L | L |
| cvss4_vuldb_vi | N | N | N | N |
| cvss4_vuldb_va | N | N | N | N |
| cvss4_vuldb_e | P | P | P | P |
| cvss2_vuldb_rl | ND | ND | ND | ND |
| cvss3_vuldb_rl | X | X | X | X |
| cvss4_vuldb_at | N | N | N | N |
| cvss4_vuldb_sc | N | N | N | N |
| cvss4_vuldb_si | N | N | N | N |
| cvss4_vuldb_sa | N | N | N | N |
| cvss2_vuldb_basescore | 2.1 | 2.1 | 2.1 | 2.1 |
| cvss2_vuldb_tempscore | 1.8 | 1.8 | 1.8 | 1.8 |
| cvss3_vuldb_basescore | 2.4 | 2.4 | 2.4 | 2.4 |
| cvss3_vuldb_tempscore | 2.2 | 2.2 | 2.2 | 2.2 |
| cvss3_meta_basescore | 2.4 | 2.4 | 2.4 | 2.4 |
| cvss3_meta_tempscore | 2.2 | 2.2 | 2.3 | 2.3 |
| cvss4_vuldb_bscore | 2.4 | 2.4 | 2.4 | 2.4 |
| cvss4_vuldb_btscore | 0.9 | 0.9 | 0.9 | 0.9 |
| advisory_date | 1760133600 (10/11/2025) | 1760133600 (10/11/2025) | 1760133600 (10/11/2025) | 1760133600 (10/11/2025) |
| price_0day | $0-$5k | $0-$5k | $0-$5k | $0-$5k |
| euvd_id | | EUVD-2025-33908 | EUVD-2025-33908 | EUVD-2025-33908 |
| cve_nvd_summary | | | A security vulnerability has been detected in Tomofun Furbo Mobile App up to 7.57.0a on Android. This affects an unknown part of the component Authentication Token Handler. The manipulation leads to insecure storage of sensitive information. It is possible to launch the attack on the physical device. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | A security vulnerability has been detected in Tomofun Furbo Mobile App up to 7.57.0a on Android. This affects an unknown part of the component Authentication Token Handler. The manipulation leads to insecure storage of sensitive information. It is possible to launch the attack on the physical device. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
| cvss4_cna_av | | | P | P |
| cvss4_cna_ac | | | L | L |
| cvss4_cna_at | | | N | N |
| cvss4_cna_pr | | | N | N |
| cvss4_cna_ui | | | N | N |
| cvss4_cna_vc | | | L | L |
| cvss4_cna_vi | | | N | N |
| cvss4_cna_va | | | N | N |
| cvss4_cna_sc | | | N | N |
| cvss4_cna_si | | | N | N |
| cvss4_cna_sa | | | N | N |
| cvss4_cna_bscore | | | 2.4 | 2.4 |
| cvss3_cna_av | | | P | P |
| cvss3_cna_ac | | | L | L |
| cvss3_cna_pr | | | N | N |
| cvss3_cna_ui | | | N | N |
| cvss3_cna_s | | | U | U |
| cvss3_cna_c | | | L | L |
| cvss3_cna_i | | | N | N |
| cvss3_cna_a | | | N | N |
| cvss3_cna_basescore | | | 2.4 | 2.4 |
| cvss2_cna_av | | | L | L |
| cvss2_cna_ac | | | L | L |
| cvss2_cna_au | | | N | N |
| cvss2_cna_ci | | | P | P |
| cvss2_cna_ii | | | N | N |
| cvss2_cna_ai | | | N | N |
| cvss2_cna_basescore | | | 2.1 | 2.1 |
| vulnerability_historic | | | | 0 |
| exploit_wormified | | | | 0 |
| advisory_confirm_date | | | | 1751509800 (07/03/2025) |
| person_name | | | | Calvin Star/Julian B |
| developer_nickname | | | | dead1nfluence |
| vulnerability_vendorinformdate | | | | 1750539600 (06/21/2025) |
| advisory_disputed | | | | 0 |
| person_nickname | | | | skelet4r/dead1nfluence |
| advisory_falsepositive | | | | 0 |
| exploit_language | | | | JavaScript |
| developer_name | | | | Julian B |
| vulnerability_discoverydate | | | | 1747332000 (05/15/2025) |
| company_name | | | | Software Secured |
| exploit_freeformen | | | | Replication Steps: Preparation: 1. On a jail broken Android device, connect a web proxy such as Burp Suite or ZAP to monitor the traffic from the Furbo mobile application. 2. Open the application, authenticate. 3. Navigate around the application, connect to a device on your account. 4. Log out of the application. 5. Swipe up and close the application process. 6. In the web proxy history, locate a request to /v5/account/read/login, copy sensitive values from the response body such as the MFA Auth Code. 7. In the web proxy history, locate a request to /v5/device/p2p_connection/get and copy the values from the response body. Exploitation: 1. Ensure Frida has been installed on the mobile device running the Furbo App. 2. Download fridump3 from: https://github.com/rootbsd/fridump3 3. Run: fridump3 -v -u -s Furbo 4. In the output directory created, executed a grep command with partial strings from the response bodies collected in step 6 and 7 of preparation. For example: grep -ri ".eJwFwc26QkAAANB3aWtBfFMsWjD-" 5. Observe that these sensitive details were kept in memory, despite being signed out and the application having been closed. |
| company_website | | | | https://www.softwaresecured.com/blog |
| advisory_freeformen | | | | An attacker who obtains access to the device of a Furbo account owner may be able to retrieve the MFA AuthCode, Cognito Authentication token, as well as P2P authentication codes associated with the account from the device's memory. This information persists on the device after the mobile application has been closed. |