Tomofun Furbo 360/Furbo Mini GATT Interface URL TF_FQDN.json ବିସ୍ତାରିତ ଅଧିକାର

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu Tomofun Furbo 360 and Furbo Mini keessatti argameera. Kan miidhamte is hojii hin beekamne faayilii TF_FQDN.json keessa kutaa GATT Interface URL Handler keessa. Hojii jijjiirraa gara ବିସ୍ତାରିତ ଅଧିକାର geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-918 geessa. Dogoggorri 05/15/2025 keessatti argame. Dadhabbii kana yeroo 10/11/2025 maxxanfameera kan maxxansiise Calvin Star, Julian B (skelet4r and dead1nfluence) waliin Software Secured. Odeeffannoon kun buufachuuf github.com irratti qoodameera. Dogoggorri kun akka CVE-2025-11648tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana github.com irraa buufachuun ni danda'ama. Hanqinni kun guyyoota 148 caalaa akka zero-day kan ummataaf hin ifneetti fayyadamee ture. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

6 ଆଡାପ୍ଟେସନ୍ · 117 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
10/13/2025 01:02 AM
ଅଦ୍ୟତନ 2/5
10/13/2025 02:20 AM
ଅଦ୍ୟତନ 3/5
10/20/2025 06:37 AM
ଅଦ୍ୟତନ 4/5
10/20/2025 06:38 AM
ଅଦ୍ୟତନ 5/5
10/28/2025 05:55 AM
software_vendorTomofunTomofunTomofunTomofunTomofun
software_nameFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo Mini
software_componentGATT Interface URL HandlerGATT Interface URL HandlerGATT Interface URL HandlerGATT Interface URL HandlerGATT Interface URL Handler
software_fileTF_FQDN.jsonTF_FQDN.jsonTF_FQDN.jsonTF_FQDN.jsonTF_FQDN.json
vulnerability_cweCWE-918 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-918 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-918 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-918 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-918 (ବିସ୍ତାରିତ ଅଧିକାର)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acHHHHH
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md
exploit_availability11111
exploit_publicity11100
exploit_urlhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.mdhttps://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md
source_cveCVE-2025-11648CVE-2025-11648CVE-2025-11648CVE-2025-11648CVE-2025-11648
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
decision_summaryThe firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.
cvss2_vuldb_avNNNNN
cvss2_vuldb_acHHHHH
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acHHHHH
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore5.15.15.15.15.1
cvss2_vuldb_tempscore4.44.44.44.44.4
cvss3_vuldb_basescore5.65.65.65.65.6
cvss3_vuldb_tempscore5.15.15.15.15.1
cvss3_meta_basescore5.65.65.65.66.2
cvss3_meta_tempscore5.35.35.35.36.0
cvss4_vuldb_bscore6.36.36.36.36.3
cvss4_vuldb_btscore2.92.92.92.92.9
advisory_date1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNNN
cvss4_cna_acHHHHH
cvss4_cna_atNNNNN
cvss4_cna_prNNNNN
cvss4_cna_uiNNNNN
cvss4_cna_vcLLLLL
cvss4_cna_viLLLLL
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore6.36.36.36.36.3
cvss3_cna_avNNNNN
cvss3_cna_acHHHHH
cvss3_cna_prNNNNN
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cLLLLL
cvss3_cna_iLLLLL
cvss3_cna_aLLLLL
cvss3_cna_basescore5.65.65.65.65.6
cvss2_cna_avNNNNN
cvss2_cna_acHHHHH
cvss2_cna_auNNNNN
cvss2_cna_ciPPPPP
cvss2_cna_iiPPPPP
cvss2_cna_aiPPPPP
cvss2_cna_basescore5.15.15.15.15.1
euvd_idEUVD-2025-33913EUVD-2025-33913EUVD-2025-33913EUVD-2025-33913
advisory_falsepositive000
person_nicknameskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluence
advisory_freeformenAn attacker within Bluetooth Low Energy (BLE) range of a Furbo Mini device can overwrite the configuration endpoint used by the device to fetch critical files such as TF_FQDN.json. By providing a custom URL via the GATT interface, the attacker can cause the Furbo to reach out to a remote attacker-controlled server during setup.An attacker within Bluetooth Low Energy (BLE) range of a Furbo Mini device can overwrite the configuration endpoint used by the device to fetch critical files such as TF_FQDN.json. By providing a custom URL via the GATT interface, the attacker can cause the Furbo to reach out to a remote attacker-controlled server during setup.An attacker within Bluetooth Low Energy (BLE) range of a Furbo Mini device can overwrite the configuration endpoint used by the device to fetch critical files such as TF_FQDN.json. By providing a custom URL via the GATT interface, the attacker can cause the Furbo to reach out to a remote attacker-controlled server during setup.
company_websitehttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/blog
exploit_languagePythonPythonPython
exploit_freeformenPreparation: 1. Acquire a BLE-capable adapter (e.g., Nordic nRF52840). 2. Obtain or build a script (Furbo_Master.py) that allows interaction with Furbo's GATT characteristics. 3. Set up an HTTP server to host a crafted TF_FQDN.json file (e.g., using Python’s http.server). Replication: 1. Start the Furbo_Master.py script. 2. Scan and connect to the Furbo Mini device. 3. Execute the send_endpoint command and specify a URL pointing to your HTTP server. 4. Run the register_info_ready command to commit the configuration change. 5. Exit the Python script with the exit command. 6. Resume setup of the camera using the official Furbo mobile app. 7. Observe the Furbo device making an HTTP request to your specified endpoint, retrieving and saving the malicious configuration file.Preparation: 1. Acquire a BLE-capable adapter (e.g., Nordic nRF52840). 2. Obtain or build a script (Furbo_Master.py) that allows interaction with Furbo's GATT characteristics. 3. Set up an HTTP server to host a crafted TF_FQDN.json file (e.g., using Python’s http.server). Replication: 1. Start the Furbo_Master.py script. 2. Scan and connect to the Furbo Mini device. 3. Execute the send_endpoint command and specify a URL pointing to your HTTP server. 4. Run the register_info_ready command to commit the configuration change. 5. Exit the Python script with the exit command. 6. Resume setup of the camera using the official Furbo mobile app. 7. Observe the Furbo device making an HTTP request to your specified endpoint, retrieving and saving the malicious configuration file.
advisory_disputed00
company_nameSoftware SecuredSoftware Secured
exploit_wormified00
person_nameCalvin Star/Julian BCalvin Star/Julian B
vulnerability_discoverydate1747332000 (05/15/2025)1747332000 (05/15/2025)
developer_nicknameSkelet4rSkelet4r
developer_nameCalvin StarCalvin Star
vulnerability_historic00
software_typeFirmware SoftwareFirmware Software
vulnerability_vendorinformdate1750539600 (06/21/2025)1750539600 (06/21/2025)
advisory_confirm_date1751509800 (07/03/2025)1751509800 (07/03/2025)
cvss3_nvd_avN
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore7.4

Do you want to use VulDB in your project?

Use the official API to access entries easily!