Submit #661879: Tomofun Furbo 360, Furbo Mini Furbo 360 (≤ FB0035_FW_036), Furbo Mini (≤ MC0020_FW_074) Insecure Storage of Sensitive Informationinfo

TitleTomofun Furbo 360, Furbo Mini Furbo 360 (≤ FB0035_FW_036), Furbo Mini (≤ MC0020_FW_074) Insecure Storage of Sensitive Information
DescriptionAn attacker who obtains a previously owned device, such as one which has been returned to Amazon or another seller, may connect to the device over UART and retrieve the SSID and Wi-Fi password of the previous owner. Factory resets do not remove the contents of the /mnt/flash/config.json file used for Wi-Fi authentication. Using a website like Wigle.net they may be able to geo-locate the previous owner and travel to their home address where they could connect to their network.
Source⚠️ https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure%20Storage%20of%20Sensitve%20Information%20-%20CVE-2025-XXXX.md
User
 jTag Labs (UID 51246)
Submission09/24/2025 16:13 (7 months ago)
Moderation10/11/2025 20:33 (17 days later)
StatusDuplicate
VulDB entry328055 [Tomofun Furbo 360/Furbo Mini UART Interface sensitive information]
Points0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!