Tomofun Furbo 360/Furbo Mini Trial Restriction विशेषाधिकार वाढीचे प्रमाण वाढले

एक कमकुवतपणा जो समस्याग्रस्त म्हणून वर्गीकृत केला आहे, तो Tomofun Furbo 360 and Furbo Mini मध्ये आढळून आला आहे. या ठिकाणी परिणाम झाला आहे अज्ञात फंक्शन घटक Trial Restriction Handler च्या. सॉफ्टवेअरमध्ये केलेले बदल विशेषाधिकार वाढीचे प्रमाण वाढले यास कारणीभूत ठरतात. समस्या जाहीर करण्यासाठी CWE वापरल्यास CWE-284 येथे नेले जाते. हा बग 15/05/2025 रोजी शोधण्यात आला. ही कमतरता प्रसिद्ध करण्यात आली होती 11/10/2025 द्वारे Calvin Star, Julian B (skelet4r and dead1nfluence) सह Software Secured. ही दुर्बलता CVE-2025-11641 म्हणून ओळखली जाते. भौतिक उपकरणावर हल्ला करणे शक्य आहे. तांत्रिक तपशील दिलेले नाहीत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. सध्या USD $0-$5k इतका असू शकतो. MITRE ATT&CK प्रकल्प T1068 हल्ला तंत्रज्ञान म्हणून घोषित करतो. प्रूफ-ऑफ-कॉन्सेप्ट म्हणून हे घोषित केले गेले आहे. 148 किंवा त्याहून अधिक दिवस ही दुर्बलता सार्वजनिक नसलेल्या झिरो-डे शोषण म्हणून हाताळली गेली होती. 0-डे म्हणून त्याची अंदाजे भूमिगत किंमत $0-$5k होती. If you want to get best quality of vulnerability data, you may have to visit VulDB.

7 बदल · 117 डेटा पॉइंट्स

शेतअद्ययावत 2/6
12/10/2025 11:14 PM
अद्ययावत 3/6
17/10/2025 07:50 AM
अद्ययावत 4/6
17/10/2025 07:51 AM
अद्ययावत 5/6
17/10/2025 07:54 AM
अद्ययावत 6/6
31/10/2025 05:43 AM
software_vendorTomofunTomofunTomofunTomofunTomofun
software_nameFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo MiniFurbo 360/Furbo Mini
software_componentTrial Restriction HandlerTrial Restriction HandlerTrial Restriction HandlerTrial Restriction HandlerTrial Restriction Handler
vulnerability_cweCWE-284 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-284 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-284 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-284 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-284 (विशेषाधिकार वाढीचे प्रमाण वाढले)
vulnerability_risk11111
cvss3_vuldb_avPPPPP
cvss3_vuldb_acHHHHH
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
source_cveCVE-2025-11641CVE-2025-11641CVE-2025-11641CVE-2025-11641CVE-2025-11641
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
decision_summaryThe firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074.
cvss2_vuldb_avLLLLL
cvss2_vuldb_acHHHHH
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss4_vuldb_avPPPPP
cvss4_vuldb_acHHHHH
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss2_vuldb_eNDNDNDPOCPOC
cvss2_vuldb_rlNDNDNDNDND
cvss2_vuldb_rcNDNDNDNDND
cvss3_vuldb_eXXXPP
cvss3_vuldb_rlXXXXX
cvss3_vuldb_rcXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss4_vuldb_eXXXXX
cvss2_vuldb_basescore3.73.73.73.73.7
cvss2_vuldb_tempscore3.73.73.73.73.3
cvss3_vuldb_basescore3.93.93.93.93.9
cvss3_vuldb_tempscore3.93.93.93.73.7
cvss3_meta_basescore3.93.93.93.94.7
cvss3_meta_tempscore3.93.93.93.84.7
cvss4_vuldb_bscore1.01.01.01.01.0
cvss4_vuldb_btscore1.01.01.00.30.3
advisory_date1760133600 (11/10/2025)1760133600 (11/10/2025)1760133600 (11/10/2025)1760133600 (11/10/2025)1760133600 (11/10/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-33905EUVD-2025-33905EUVD-2025-33905EUVD-2025-33905EUVD-2025-33905
cve_nvd_summaryA vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. This impacts an unknown function of the component Trial Restriction Handler. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The attack is considered to have high complexity. The exploitability is said to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. This impacts an unknown function of the component Trial Restriction Handler. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The attack is considered to have high complexity. The exploitability is said to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. This impacts an unknown function of the component Trial Restriction Handler. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The attack is considered to have high complexity. The exploitability is said to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. This impacts an unknown function of the component Trial Restriction Handler. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The attack is considered to have high complexity. The exploitability is said to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. This impacts an unknown function of the component Trial Restriction Handler. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The attack is considered to have high complexity. The exploitability is said to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avPPPPP
cvss4_cna_acHHHHH
cvss4_cna_atNNNNN
cvss4_cna_prNNNNN
cvss4_cna_uiNNNNN
cvss4_cna_vcLLLLL
cvss4_cna_viLLLLL
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore11111
cvss3_cna_avPPPPP
cvss3_cna_acHHHHH
cvss3_cna_prNNNNN
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cLLLLL
cvss3_cna_iLLLLL
cvss3_cna_aLLLLL
cvss3_cna_basescore3.93.93.93.93.9
cvss2_cna_avLLLLL
cvss2_cna_acHHHHH
cvss2_cna_auNNNNN
cvss2_cna_ciPPPPP
cvss2_cna_iiPPPPP
cvss2_cna_aiPPPPP
cvss2_cna_basescore3.73.73.73.73.7
advisory_falsepositive0000
person_nameCalvin Star/Julian BCalvin Star/Julian BCalvin Star/Julian BCalvin Star/Julian B
person_nicknameskelet4r/dead1nfluenceskelet4r/dead1nfluenceskelet4r/dead1nfluence
software_typeFirmware SoftwareFirmware SoftwareFirmware Software
exploit_freeformenReplication Steps: 1. Modify the factory config file located in /mnt/hw/factory.json to include the MAC address and BTMAC address 2. Change the MAC address specified within the factory.json file 3. Remove the device configuration file located in /mnt/flash/furbo/setup_info.json 4. Reboot the Furbo 5. Complete the registration process of the Furbo in the mobile appReplication Steps: 1. Modify the factory config file located in /mnt/hw/factory.json to include the MAC address and BTMAC address 2. Change the MAC address specified within the factory.json file 3. Remove the device configuration file located in /mnt/flash/furbo/setup_info.json 4. Reboot the Furbo 5. Complete the registration process of the Furbo in the mobile appReplication Steps: 1. Modify the factory config file located in /mnt/hw/factory.json to include the MAC address and BTMAC address 2. Change the MAC address specified within the factory.json file 3. Remove the device configuration file located in /mnt/flash/furbo/setup_info.json 4. Reboot the Furbo 5. Complete the registration process of the Furbo in the mobile app
exploit_wormified000
company_nameSoftware SecuredSoftware SecuredSoftware Secured
developer_nameCalvin StarCalvin StarCalvin Star
advisory_freeformenThis vulnerability allows an attacker with physical access to the device to bypass trial restrictions by modifying the device's MAC address. Each time the MAC address on the device is changed a new corresponding DeviceID is assigned to the Furbo which results in a fresh 30-day premium trial being assigned to the device during the registration process. This effectively grants unlimited access to premium features for the Furbo device.This vulnerability allows an attacker with physical access to the device to bypass trial restrictions by modifying the device's MAC address. Each time the MAC address on the device is changed a new corresponding DeviceID is assigned to the Furbo which results in a fresh 30-day premium trial being assigned to the device during the registration process. This effectively grants unlimited access to premium features for the Furbo device.This vulnerability allows an attacker with physical access to the device to bypass trial restrictions by modifying the device's MAC address. Each time the MAC address on the device is changed a new corresponding DeviceID is assigned to the Furbo which results in a fresh 30-day premium trial being assigned to the device during the registration process. This effectively grants unlimited access to premium features for the Furbo device.
vulnerability_vendorinformdate1750539600 (21/06/2025)1750539600 (21/06/2025)1750539600 (21/06/2025)
exploit_languageBashBashBash
advisory_confirm_date1751509800 (03/07/2025)1751509800 (03/07/2025)1751509800 (03/07/2025)
vulnerability_historic000
exploit_availability111
company_websitehttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/bloghttps://www.softwaresecured.com/blog
exploit_publicity000
advisory_disputed000
developer_nicknameSkelet4rSkelet4rSkelet4r
vulnerability_discoverydate1747332000 (15/05/2025)1747332000 (15/05/2025)1747332000 (15/05/2025)
cvss3_nvd_avP
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore6.4

Interested in the pricing of exploits?

See the underground prices here!