CVE-2025-11649
low-risk
Published 2025-10-12
A vulnerability was found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Root Account Handler. Performing manipulation results in use of hard-coded password. The attack must be initiated from a local position. The attack is considered to have high complexity. The exploitability is described as difficult. The exploit has been made public and could be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.0/10
High
LOCAL
/ HIGH complexity
Affected Products (2)
Furbo Mini Firmware
Furbo 360 Dog Camera Firmware
Affected Vendors
References (5)
Third Party Advisory
https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Hardcoded-Password.m...
Permissions Required
https://vuldb.com/?ctiid.328060
Third Party Advisory
https://vuldb.com/?id.328060
Third Party Advisory
https://vuldb.com/?submit.662769
Third Party Advisory
https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Hardcoded-Password.m...
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low