A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md | Third Party Advisory Exploit |
| https://vuldb.com/?ctiid.328059 | Permissions Required VDB Entry |
| https://vuldb.com/?id.328059 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.662768 | Third Party Advisory VDB Entry |
| https://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md | Third Party Advisory Exploit |
Configurations
History
28 Oct 2025, 01:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md - Third Party Advisory, Exploit | |
| References | () https://vuldb.com/?ctiid.328059 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.328059 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.662768 - Third Party Advisory, VDB Entry | |
| First Time |
Furbo furbo 360 Dog Camera
Furbo Furbo furbo Mini Furbo furbo 360 Dog Camera Firmware Furbo furbo Mini Firmware |
|
| CPE | cpe:2.3:o:furbo:furbo_360_dog_camera_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:furbo:furbo_mini_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:furbo:furbo_mini:-:*:*:*:*:*:*:* cpe:2.3:h:furbo:furbo_360_dog_camera:*:*:*:*:*:*:*:* |
20 Oct 2025, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way. |
14 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/dead1nfluence/Furbo-Advisories/blob/main/SSRF-via-BLE.md - |
12 Oct 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-12 22:15
Updated : 2025-10-28 01:59
NVD link : CVE-2025-11648
Mitre link : CVE-2025-11648
CVE.ORG link : CVE-2025-11648
JSON object : View
Products Affected
furbo
- furbo_mini_firmware
- furbo_360_dog_camera_firmware
- furbo_mini
- furbo_360_dog_camera
CWE
CWE-918
Server-Side Request Forgery (SSRF)
