Tomofun Furbo 360/Furbo Mini GATT Service DeviceToken ସୂଚନା ପ୍ରକାଶ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame Tomofun Furbo 360 and Furbo Mini keessatti argameera. Miidhamni argame is hojii hin beekamne kutaa GATT Service keessa. Wanti jijjiirame irratti DeviceToken gara ସୂଚନା ପ୍ରକାଶ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-200 si geessa. Dogoggorri 05/15/2025 irratti mul’ate. Odeeffannoon kun yeroo 10/11/2025 maxxanfameera kan maxxansiise Calvin Star, Julian B (skelet4r and dead1nfluence) waliin Software Secured. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2025-11647 jedhamee waamama. Weerara kanaaf milkaa'ina argachuuf, networkii naannoo irratti argamuu qabda. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Hanqinni kun guyyoota 148 ol tajaajila zero-day kan hin beekkaminitti fayyadamee ture. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get best quality of vulnerability data, you may have to visit VulDB.

6 ଆଡାପ୍ଟେସନ୍ · 116 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
10/13/2025 12:26 AM
ଅଦ୍ୟତନ 2/5
10/13/2025 01:02 AM
ଅଦ୍ୟତନ 3/5
10/18/2025 11:29 PM
ଅଦ୍ୟତନ 4/5
10/18/2025 11:30 PM
ଅଦ୍ୟତନ 5/5
10/28/2025 05:55 AM
software_vendorTomofunTomofunTomofunTomofunTomofun
software_nameFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo Mini
software_componentGATT ServiceGATT ServiceGATT ServiceGATT ServiceGATT Service
software_argumentDeviceTokenDeviceTokenDeviceTokenDeviceTokenDeviceToken
vulnerability_cweCWE-200 (ସୂଚନା ପ୍ରକାଶ)CWE-200 (ସୂଚନା ପ୍ରକାଶ)CWE-200 (ସୂଚନା ପ୍ରକାଶ)CWE-200 (ସୂଚନା ପ୍ରକାଶ)CWE-200 (ସୂଚନା ପ୍ରକାଶ)
vulnerability_risk11111
cvss3_vuldb_avAAAAA
cvss3_vuldb_acHHHHH
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iNNNNN
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.md
exploit_availability11111
exploit_publicity11100
exploit_urlhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/Information-Disclosure-DeviceToken.md
source_cveCVE-2025-11647CVE-2025-11647CVE-2025-11647CVE-2025-11647CVE-2025-11647
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
decision_summaryThe firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.
cvss2_vuldb_avAAAAA
cvss2_vuldb_acHHHHH
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avAAAAA
cvss4_vuldb_acHHHHH
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.81.81.81.81.8
cvss2_vuldb_tempscore1.51.51.51.51.5
cvss3_vuldb_basescore3.13.13.13.13.1
cvss3_vuldb_tempscore2.82.82.82.82.8
cvss3_meta_basescore3.13.13.13.14.3
cvss3_meta_tempscore2.82.92.92.94.2
cvss4_vuldb_bscore2.32.32.32.32.3
cvss4_vuldb_btscore1.31.31.31.31.3
advisory_date1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-33911EUVD-2025-33911EUVD-2025-33911EUVD-2025-33911EUVD-2025-33911
cve_nvd_summaryA flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The exploit has been published and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The exploit has been published and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The exploit has been published and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avAAAA
cvss4_cna_acHHHH
cvss4_cna_atNNNN
cvss4_cna_prNNNN
cvss4_cna_uiNNNN
cvss4_cna_vcLLLL
cvss4_cna_viNNNN
cvss4_cna_vaNNNN
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore2.32.32.32.3
cvss3_cna_avAAAA
cvss3_cna_acHHHH
cvss3_cna_prNNNN
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cLLLL
cvss3_cna_iNNNN
cvss3_cna_aNNNN
cvss3_cna_basescore3.13.13.13.1
cvss2_cna_avAAAA
cvss2_cna_acHHHH
cvss2_cna_auNNNN
cvss2_cna_ciPPPP
cvss2_cna_iiNNNN
cvss2_cna_aiNNNN
cvss2_cna_basescore1.81.81.81.8
person_nicknameskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluence
vulnerability_vendorinformdate1750539600 (06/21/2025)1750539600 (06/21/2025)
developer_nameCalvin StarCalvin Star
vulnerability_discoverydate1747332000 (05/15/2025)1747332000 (05/15/2025)
developer_nicknameSkelet4rSkelet4r
advisory_disputed00
exploit_freeformenExploitation: 1. Launch the Furbo_Master.py script. 2. Scan and connect to the Furbo device shown in the BLE device list. 3. Execute the reset command to trigger BLE reinitialization. 4. Execute the reconnect command to resume communication. 5. Scan again and reconnect to the re-advertised Furbo device. 6. Execute the read_device_token command. 7. Observe the returned Device Token from the BLE characteristic.Exploitation: 1. Launch the Furbo_Master.py script. 2. Scan and connect to the Furbo device shown in the BLE device list. 3. Execute the reset command to trigger BLE reinitialization. 4. Execute the reconnect command to resume communication. 5. Scan again and reconnect to the re-advertised Furbo device. 6. Execute the read_device_token command. 7. Observe the returned Device Token from the BLE characteristic.
advisory_freeformenAn attacker within Bluetooth Low Energy (BLE) range of the Furbo Mini device can read a GATT characteristic that leaks the device’s DeviceToken. This token is used to authenticate the device with Furbo’s backend services. If intercepted, an attacker can reuse the DeviceToken to re-register the victim’s device to a rogue account, effectively disabling the victim’s access and ability to use their device.An attacker within Bluetooth Low Energy (BLE) range of the Furbo Mini device can read a GATT characteristic that leaks the device’s DeviceToken. This token is used to authenticate the device with Furbo’s backend services. If intercepted, an attacker can reuse the DeviceToken to re-register the victim’s device to a rogue account, effectively disabling the victim’s access and ability to use their device.
advisory_falsepositive00
company_nameSoftware SecuredSoftware Secured
exploit_wormified00
vulnerability_historic00
software_typeFirmware SoftwareFirmware Software
advisory_confirm_date1751509800 (07/03/2025)1751509800 (07/03/2025)
person_nameCalvin Star/Julian BCalvin Star/Julian B
company_websitehttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/blog
cvss3_nvd_avA
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iN
cvss3_nvd_aH
cvss3_nvd_basescore6.8

Do you need the next level of professionalism?

Upgrade your account now!