| Title | Tomofun Furbo 360, Furbo Mini Furbo 360 (≤ FB0035_FW_036), Furbo Mini (≤ MC0020_FW_074) Insecure Storage of Sensitive Information |
|---|
| Description | An attacker who retrieves the x-amz-grant-full-control ID from the collect_logs.sh file located on the Furbo device can use it to upload arbitrary data to the Furbo Device Debug Log S3 bucket. This may pollute the data source for Furbo, or result in a compromise of their systems or services if malware is uploaded and later executed. Additionally, as device IDs are issued sequentially, it is possible that an attacker could upload arbitrary files which would be associated with other Furbo user's devices. |
|---|
| User | jTag Labs (UID 51246) |
|---|
| Submission | 09/23/2025 19:15 (7 months ago) |
|---|
| Moderation | 10/11/2025 20:33 (18 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 328050 [Tomofun Furbo 360/Furbo Mini Debug Log S3 Bucket collect_logs.sh sensitive information] |
|---|
| Points | 17 |
|---|